General

  • Target

    4572-23-0x00000000030B0000-0x00000000030E0000-memory.dmp

  • Size

    192KB

  • MD5

    d92fb3bd1e5b46dc3741bfbfa3f02ec7

  • SHA1

    8fadb78e4ff2f45fcbe820c986d865a8fcbb23ea

  • SHA256

    ceed6132f0e94a2227fe093362b420e0bf1119086c0619fc0dc59d9bae0313c1

  • SHA512

    2c74980d65f390faa19caa29b0f9c548094562b87b0172c8ea26f0049d7e054d9c6a45d63341cf6bbc9a9dcf3078074b0bcfcd6d969d79b4ba7609f88ae35985

  • SSDEEP

    3072:2B5TkvFp91I0WK3W1OPAAFNyQE02HPS0aJ18e8ho:2LkN1I0WK3WiyQE0J0an

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4572-23-0x00000000030B0000-0x00000000030E0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections