General

  • Target

    5004-2-0x00000000003C0000-0x00000000003F0000-memory.dmp

  • Size

    192KB

  • MD5

    489767f57b615d1a429c0901b49371e9

  • SHA1

    6d1a261355827005bcc8dc5c9b056833e2ca678f

  • SHA256

    5041d5a89876c9ef56c14b762d5400d22c6c750ada4f350034363d6e99833e33

  • SHA512

    1b36be6350e7cb2ba564e6de055ec7eb673acf27174a3a6f73f3952bc4a437fd68608c836fc5a60a27c859da2d334b512080d478a0c632800ea188cc8cf09b79

  • SSDEEP

    3072:CcYbZTUzl6I0f3jZSOLT0KWhFmfhE0OxHt0Ul5J48e8h4:7YbZA6I0f3jZohMhE0c0Ul5G

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

prvt

C2

176.123.9.142:14845

Attributes
  • auth_value

    a0550c49d784b5105c404695277f15b8

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5004-2-0x00000000003C0000-0x00000000003F0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections