General

  • Target

    3268-0-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    530766ebb8c2bc51a3b7894057b3bd2c

  • SHA1

    58f1a0548e18ade4aeedbbbe1e9a36889305a60b

  • SHA256

    d4dd894a16334a585e674459d96bcba2f440c15dc675d7c8677f057498fc7f79

  • SHA512

    30ca0b2b980171e7f5c1210621741abebf5e5efad0ecd51b47565d42a422ca9addb86d939d1602dcbf7f71a7a1ab242d371d383cf51fe2d86637ab1d2e5e3fd1

  • SSDEEP

    3072:fksbm8x7I0k4SW6O6jC543if6GE0sjc4vjkJx8e8hA:fksV7I0k4SWSGE0F2jk3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

unique285

C2

194.169.175.232:45451

Attributes
  • auth_value

    1ed06994a9a19d3729019cb69c1f61a6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3268-0-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections