General

  • Target

    6124-383-0x00000000001A0000-0x00000000001D0000-memory.dmp

  • Size

    192KB

  • MD5

    2cf00b311cdd4dc029a7ab6093bd4756

  • SHA1

    a33b407f0b9c8ed5ceb73c73074a058a6ada4949

  • SHA256

    719d3f1fe91aa6836a36d232902a41e40a3b510e1c894d476d431591494e1e57

  • SHA512

    cc874bb8dcb85045c2a002c98ccc5b787c2c5a82d55e142edaab772eb54693f22e44d7d028820e641579309a40c3457ea779fb23e7e132f858a1cb7297ddb984

  • SSDEEP

    3072:GORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJS8e8he:SSp3I0SbF/OVESYoqE0XmFueU

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6124-383-0x00000000001A0000-0x00000000001D0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections