General

  • Target

    1976-4-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    cf4ff1250456172ef147edd2bae24bd6

  • SHA1

    c383e081dee0a26888ea8ba1ba429cdf97779cc8

  • SHA256

    47ad9c2867e665df2018581462f12da7455f547384f61488d08a63550a97a89f

  • SHA512

    4b34b29ebad3c65d9f5c7d549d2e926358e92ad69111a07706d1a47d4db5be12c1491aa11e35672bdae6ff1011832c012ce46be4f349d1bcea58bbe5c5b39c5e

  • SSDEEP

    3072:imgMO9TxI0Q9+nrOoyo5zts7E02v8mkJ:imgZxI0Q9+no7E0+k

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gruha

C2

77.91.124.55:19071

Attributes
  • auth_value

    2f4cf2e668a540e64775b27535cc6892

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1976-4-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections