General

  • Target

    1972-166-0x0000000004580000-0x00000000045BE000-memory.dmp

  • Size

    248KB

  • MD5

    c95a3deef73916b6253ff0895522e246

  • SHA1

    898ecfcf6f0911af9766cb953ffb45216c98874a

  • SHA256

    cc8334df59afeec248fadcea16db6394c15af9ee538a0660aebd0baf32344dc9

  • SHA512

    213aa5c3611db7ce904755a3faf431602ed71977d29ac29fe8964387c31737c786282a05fff7e308326d4c1aaea701ba24649f793ce05f8394912d277db188c1

  • SSDEEP

    3072:JJctOPGO2n1NgcU6YW8qu7SHBFt/qLdVPMxX/jEIgcRo:HDPGv1NgcUVWCuHF/CXPMxXLEfc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

176.123.4.46:33783

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1972-166-0x0000000004580000-0x00000000045BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections