General

  • Target

    5096-34-0x0000000000C70000-0x0000000000CA0000-memory.dmp

  • Size

    192KB

  • MD5

    ba2e1e6521851d4b3e40d9db2a7b6908

  • SHA1

    95ca1eff3d436264cbb5877f9002a83c29d939e4

  • SHA256

    dee7ac98338b4ab653e34264d671b99e3e63b66bcf2cf5cb1755816108bce946

  • SHA512

    4a6fce7fcd7b5b5ded1f01ebc9bf77738d6fe00c3d425bc402b7704a13ce9df49beb053eba0b29fb4708ee35d41a0aba1ad7c0768af8fc9809945db9223a8930

  • SSDEEP

    3072:2B5TkvFp91I0WK3W1OPAAFNyQE02HPS0aJC8e8ho:2LkN1I0WK3WiyQE0J0aY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5096-34-0x0000000000C70000-0x0000000000CA0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections