General

  • Target

    2064-2-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    12fd7c4dafc1b4c5558c6d571107ef32

  • SHA1

    5a391c47ca22965e2f50d8df83feb7935b177978

  • SHA256

    877f1a2437bf0a999e5ab715259f2a88f85f001c5638370e7681c2a8c563f6bf

  • SHA512

    832fd4922e9a06297f4ac9d93a9e6e7daf3c6f34061d505f1d4f81e75d89d7835dbbd6cfd74142e70e2a90ff6f1ed05f728323011b2bea073d7ab2482a101def

  • SSDEEP

    3072:RkqAk39I0KupeAqO6+SfUV0kuEwsE0io7jsxJ:RkI9I0KupeAJ0p9sE0Jsx

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

unique

C2

194.169.175.232:45451

Attributes
  • auth_value

    f0fd3601970008e3a7ca7fe350106223

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2064-2-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections