General

  • Target

    3200-2-0x0000000004B70000-0x0000000004BA0000-memory.dmp

  • Size

    192KB

  • MD5

    90518d784edd91f447a4364dc8eb9e01

  • SHA1

    17856e04bde03aeebe29765518c3c373c9dba6f1

  • SHA256

    bfe80f0b39cd458480abfd8dfc8b16eeee78a138fad9dad8e9cf6e86c8d97abd

  • SHA512

    9057ab293afdd7a2b3944149a0fa129f38b54e5f082f4b18e08b7307c2db6e6c187403cf984d28f69bdbdd9bcf475b7819a4b86fa1077f8e97b61f62a644c3e8

  • SSDEEP

    3072:5U3wkV/14I0knO4bLOpRG5p6QsE0CCGgGpy9JV8e8hc:5UL94I0knO4bL6QsE0DGpy9n

Malware Config

Extracted

Family

redline

Botnet

LegendaryInstalls_20230918

C2

62.72.23.19:80

Attributes
  • auth_value

    7e2e28855818d91285389c56372566f4

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3200-2-0x0000000004B70000-0x0000000004BA0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections