General

  • Target

    3396-624-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    1b5cd6cb3d86611d9ecf151d6f8e5e75

  • SHA1

    b56ba023e840b7eb5aa2e506cd444d1253ba1365

  • SHA256

    4dd4084f4838202d9480ae6cb287b5d6babaabc488be2c3a3518ab34f11f192b

  • SHA512

    d896c55d722edef2806dd896ca686fe50f3a4e257873683bafd7a1de337476c788b984e7b935a4a29a5130bad99ef0641e847e0ea77ffc368a57a464cf6100f2

  • SSDEEP

    3072:C3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:CeGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3396-624-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections