General

  • Target

    2132-4-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    da4c1ded14b1cd71462e8cffdb0ffd13

  • SHA1

    da2a369d0b9909b5740359035d482b7ef4f31267

  • SHA256

    153022c9069fd5051e042ce58a9800c4ae44a3704681038449432fbe3c19c073

  • SHA512

    ead17d73f16af3e4278cbf8aa3ab66d32d8f7a0050c662c586f4bc561a2778cdb2ce49b6ee8ae8ff0cba452091816d436b248d5d05270b5ce179656361470a93

  • SSDEEP

    3072:zTplAMnzNgcg/XelP+06zOE619Gt/qhRWTcZLdptHIfEuN:HplXzNgcg/ulP+lzm94/bTcZLjtofEu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

magia

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2132-4-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections