General

  • Target

    772-49-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    6bcb8f98e93a274c99a9d053a5d0cd50

  • SHA1

    d873ddbcb21307ebaa87859a1b673eb09e56158a

  • SHA256

    39ed664392377496bbbd0ac84ea54ed7b15fd1ecfd4ce8b7aeb3d4131505d59a

  • SHA512

    e01e93cf231f42ed0ae2d9d7340002d1afa28be0b74b49e5049ce61f6ed5fcb4312baf6f0c6eedbb963f18074ba97737e4895e5f346a51a4a4a277c7e9e01a5f

  • SSDEEP

    3072:HskouTnLNgcTxA3TZ3O865ju5xft/qqqyP/RNLPkq3:HskoGLNgcdoTFOV5ju57/QyP/rDk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

breha

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 772-49-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections