General

  • Target

    3624-1803-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    9f3a14d26be1726b0b3e761e6ea23f4f

  • SHA1

    593ba187c48993de897e454622760831b52a5bff

  • SHA256

    08893fef528599ec5c212f685a906e923a635a0978ceb2c3c0b3410f2ae850b1

  • SHA512

    03b94414ad7404940773f52b01d5dc1fa4594eca169d042e4e1da38de0640f0114ddd7ce5143f9abecd8cbe99a54ebda657083d73c1713e574a9bc9b21d9db46

  • SSDEEP

    3072:iORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJM8e8he:eSp3I0SbF/OVESYoqE0XmFueK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3624-1803-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections