General

  • Target

    1280-40-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    86c3affb8be0b5e3a39d72093b32bbb4

  • SHA1

    6686f5f14c89ee8823f56b7dfa48dd2ea9304efa

  • SHA256

    66b2501e82f6621f96390763322f32a6a6e95d6622a6b8d8a81736b05e258d5a

  • SHA512

    6af776c953f92f20624b0ca7d6ecdf776ea1ff7d8a9433b411084fdea94633d333ea763a496771944fe935423cc2beabdd166d1ea83609e81be30a79a1494b35

  • SSDEEP

    3072:8wJwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1JQ8e8h3:8ozAmmI0k7vVe0E0YIM1u

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1280-40-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections