General

  • Target

    4280-292-0x0000000000A10000-0x0000000000A4E000-memory.dmp

  • Size

    248KB

  • MD5

    bd1268f9ab5c356f60f24fd86ef33283

  • SHA1

    f7e88fe42b91cd8ba30051a615a2ad531f240dce

  • SHA256

    37a866374e6aa20649bcf4b354395c4d590450d1aa0a1a78bfc35ca75515426d

  • SHA512

    718f924ffed0bf74d76016fdfcac086ac60316b905703afa307c4d0156af386a4c5e6483d0448471608746ea3f5e7aac67e066ee0b29b6a0d500d364a13c7214

  • SSDEEP

    3072:jEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad7:jGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4280-292-0x0000000000A10000-0x0000000000A4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections