General

  • Target

    3772-215-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    5f1636989a9e96c7a60ffb41012a2644

  • SHA1

    f24c96fd95a6a7eac897e93b75c3f3920b9e0e1a

  • SHA256

    d4b0f1fc26d0039a7d87ce9fe72fb2fc09b2bc50e162f0234201abeddb55c93e

  • SHA512

    2baef25b5b5c22373c733ba207e9de273d3332d6af268683aa65da62766780875911fde10f893c914be17b006221aa8aa88f478ca1cb4f50599203c275069d41

  • SSDEEP

    3072:p3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:peGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3772-215-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections