General

  • Target

    4572-585-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    603e9d507d81066cc4e4d65f0d582374

  • SHA1

    03316cd35546cf01594b58fce4a366175ba352b1

  • SHA256

    1e42b3c88e6e095616e7fbf7f07df55a32fbb1de0795d66cf642d3c83c8cf2be

  • SHA512

    7a3782d7f5f1d52785642765f354b7a6068aa463efe78960b0aa2d0bac2a9acc0d981b2a518eeeb12936aa52895b1ad150b008aded8710f82df5e36ec453363e

  • SSDEEP

    3072:R3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:ReGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4572-585-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections