General

  • Target

    1732-7-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    aa0ae1ac54fd596fa7749cea71575ce3

  • SHA1

    a3a09bb47c42fbea78a0262604024a57c9183a5d

  • SHA256

    c4bf3f4b654990f0958184f53973750a2df26f167e49d40edd093a86c022ac18

  • SHA512

    8a0c8022291105dffadcdeaf85132dce710fa66f2bc815d75f3ebf8d5bc63e40e0e61f41702918869244f8b7c785c6f83a5be3004f77c333af926e7ad2b99f18

  • SSDEEP

    1536:9GvUHORW36sv0W7TgYXe0ZrHNeZQyv4GmBQdYO8eH2xN37YQzJbuoYnX/FiThM0r:Q8H4gLXDnevgGeQuX+2xNsoAn9iThM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nvidiaKR

C2

77.105.146.162:28835

Attributes
  • auth_value

    02a73f22b9381fd5041dc4f1e0c6c6f2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1732-7-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections