General

  • Target

    1912-0-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    77c094d88e371ff785211c3da307d987

  • SHA1

    2ec83b45b28aa3ee42f8da5cd2a0672088c6f563

  • SHA256

    116eb6aca2d8be12d098d3085b6347a74cbc90d0049ab7b15fdbbd3e967e0a98

  • SHA512

    97c87e20c26f4dfadd33dee664c294b190cc1aba139e63e6a6245d0bae905f71605b8ab433f7856ecbf6b64285e401062bfb8031f427feb8d95aa814c09dd3b9

  • SSDEEP

    3072:RkqAk39I0KupeAqO6+SfUV0kuEwsE0io7jsxJ/8e8h2:RkI9I0KupeAJ0p9sE0JsxJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

unique

C2

194.169.175.232:45451

Attributes
  • auth_value

    f0fd3601970008e3a7ca7fe350106223

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1912-0-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections