General

  • Target

    4168-49-0x0000000000560000-0x0000000000590000-memory.dmp

  • Size

    192KB

  • MD5

    a8e22d904bac12a384e3dd0ae60c02bc

  • SHA1

    08e2b10b9f6a76674dc82395db0b65af5c19bd6c

  • SHA256

    289debbc5b61605407c6a250d1f7bd52db609605582ca32aafe176077c718b38

  • SHA512

    784b257179480ce9f32409d8cd5d554c101c7f2a2e0e14e2d10df1f57f385a6e52cfe830cb560fb47daafdf3e3771dec768917eab6fa803a99e3d4abdd254478

  • SSDEEP

    3072:l7KhtvNxZ8I0aLS9DI0OPleKiIylE0+lKsHXOiT4JG8e8hh:lKht18I0aLSDIOIylE0QXOiT4Y

Score
10/10

Malware Config

Extracted

Family

redline

C2

38.181.25.43:3325

Attributes
  • auth_value

    082cde17c5630749ecb0376734fe99c9

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4168-49-0x0000000000560000-0x0000000000590000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections