General

  • Target

    1620-3-0x0000000000080000-0x00000000000B0000-memory.dmp

  • Size

    192KB

  • MD5

    847ce96b3aaa6abc73184e908d59c548

  • SHA1

    608f81f9d5675b47e5283955b3d8619bc67a8959

  • SHA256

    497daf474c94ab21e17432bb33fc2e99fc7af9c728fde036e3f63a200073c77e

  • SHA512

    64b70a15edca84aae3b191444a09f6caca30eea41c5f10cd27f27d75e05d4a6e7080b3d0a5e1e3d33ec428cbb4fb5c6ca6da663701787c4640cf9696bbc9028f

  • SSDEEP

    3072:6huxEBJaVoI0ONwSvO2uyd7wDX2ZLE0eL2T+0JQ8e8hV:JxDoI0ONwSlwDX2ZLE0V+0m

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.4.46:33783

Attributes
  • auth_value

    94ecdfa2eb126d66ce500353b2fa9112

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1620-3-0x0000000000080000-0x00000000000B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections