General

  • Target

    1140-357-0x0000000000080000-0x00000000000B0000-memory.dmp

  • Size

    192KB

  • MD5

    c69073e640836674c2987817cd7320a3

  • SHA1

    14ef69445ef850b852c742eb085c8e85bf0109b4

  • SHA256

    36d6afe0db32ced95cab8f5c6c4daa79d0426127d4f1f4ce69ac83abcfc12671

  • SHA512

    0025826b853026005b393286288f788403ac633111da3039fde0ae14bf8ccce9fb50d642cb8f027d6144997004c84f7d76e8ce6eab10cf06a34292803fb6296e

  • SSDEEP

    3072:4ORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJ08e8he:oSp3I0SbF/OVESYoqE0XmFuey

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1140-357-0x0000000000080000-0x00000000000B0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections