General

  • Target

    744-647-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    ded688597290bf4ab492234df1b13187

  • SHA1

    e6776a9768a143ee2fc0a02d2afae1d291232749

  • SHA256

    5a6539bb9f94854f38732c228114911b74279c26274f97903d14758dfd1207c6

  • SHA512

    3b6f9a239ddb177cacf2b0eb38847eafe76944833e64dc5cf2cce138ac2f5564db09e66a9a7788a37bb7b0c4aed7786cff20bbd3f64e6e6f6556a7e5fcf07852

  • SSDEEP

    3072:tORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJv8e8he:1Sp3I0SbF/OVESYoqE0XmFueF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 744-647-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections