General

  • Target

    3504-459-0x00000000013B0000-0x00000000013EE000-memory.dmp

  • Size

    248KB

  • MD5

    e1919774d1bc8f618ce1fb66ef48200d

  • SHA1

    fb655a919438fa23ac3bc2c13dfe5940d10233f6

  • SHA256

    a401cf2b7d0b2382c4a6206169d274728093954425fcacda953efadb56afd78b

  • SHA512

    bd476b5090a267aad9db3dd26c35ec13cc42ae9e4a29aa602c20d2447c7e728e262eacde8c515f81474c877f3e44239b3765ff072d14f65afeba8e132e674f9d

  • SSDEEP

    3072:BJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRY:PDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3504-459-0x00000000013B0000-0x00000000013EE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections