General

  • Target

    5728-222-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    416dc757de807f14f7fcf4e978749073

  • SHA1

    b125cfb46dfe60126bc636a39a36920a0d54bb25

  • SHA256

    05dccd8faca4d753fe848e05070f8989b9aacadd5e99ffa6b6947569e87a8431

  • SHA512

    e2fac60eace922620bb31038ea2e91c5fb77a9884fd0f6641a06a9f87eafbd16a266383ec0c5dbc3969522281f2a1d66e367de1223e879e117c88ebbcb201f8c

  • SSDEEP

    3072:gORGSnRfr3I0SbF/tOOc5XjVEHyYoqE0sAiJrFueJM8e8he:wSp3I0SbF/OVESYoqE0XmFueK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT LOGS CLOUD

C2

176.123.4.46:33783

Attributes
  • auth_value

    f423cd8452a39820862c1ea501db4ccf

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5728-222-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections