General

  • Target

    4032-619-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    35b17daf242830372195fc6298fc703c

  • SHA1

    be93a4927279d7bd10dab7a5753b8ec60c1196ec

  • SHA256

    bc5f7406e9880ce2fc591aeae05a72ce853ea8ac72ce06057f59a210ad9c4f9d

  • SHA512

    2ea4b8bb917bae45fb66c374093aaa45fa0e0fc3b2bd0950b7a08b507b048806bbf5a3439fcbcbaa15560e8660c6901689b1c1168b843d1d58c374700ee3c0ab

  • SSDEEP

    3072:MJ5VYw7/IiI00uW+LTOycO/CjNpJE0EbsdTylJM8e8hX:MJ5VY/iI00uW++fJE0ZTyla

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

prets

C2

77.91.124.82:19071

Attributes
  • auth_value

    44ee9617e145f5ca73d49c1a4a0c2e34

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4032-619-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections