General

  • Target

    3032-23-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    3fa6482a83069c3a0c99d6ae091c00e8

  • SHA1

    4e01f332680c2f6e3d71723b0b79b30d670a4a54

  • SHA256

    de9b0bf23854d47a87ac630c08ff2177daa05567b92171f34e8a532720325292

  • SHA512

    46a0b844c419ef88c05fe576978948e0372b1e5c90496b41f60a1e7a8048b574771d3944a62da76ae13c16a054953a5c79ea33dea3b01ae1f9574d41e6f8a0aa

  • SSDEEP

    3072:5BBgjShnANgcMdYFsLVOlL+Mvt/qNt6wEIM9hmJYVvlnok:SjkANgcMeFsLolL71/G6/IyhcYVvln

Malware Config

Extracted

Family

redline

Botnet

seevpalpadin-103

C2

38.181.25.43:3325

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3032-23-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections