General

  • Target

    4924-0-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    96b00fd492aaffd299d8e64dcfe721f9

  • SHA1

    8454c0a5466aac468840a22045f02202f4a702d1

  • SHA256

    c8176b09a220d58dc99b8b515d0353fcd35d7907ffe6acb38bc3027c9bb484a7

  • SHA512

    3c90b3ffaa8d2305a7a44d306403e7c3b7025abec9987fb58fc5194948b43a1eb45b50fc467bf4ff1f9cb47e61253762111623fdd161dac99759981dd3ed2d7e

  • SSDEEP

    3072:p0wbFZDv4dXsI0pXEaDORYjOWR5NGE0c2HNTRtJk8e8h/:p0wZZDYsI0pXEazNGE0PTRti

Score
10/10

Malware Config

Extracted

Family

redline

C2

194.169.175.232:45451

Attributes
  • auth_value

    277a7742ea9b1da2a636fb11c1abcacd

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4924-0-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections