General

  • Target

    4596-194-0x0000000002DF0000-0x0000000002E20000-memory.dmp

  • Size

    192KB

  • MD5

    6ca5017195c13b77354ac5eaf400bc7c

  • SHA1

    c5d70fd4c8bbfe040dde0c15c96296d9fa50ffd5

  • SHA256

    1ba65b33608caae9e2de85dd73767a2d7992653927f15fbf29ec4da893f894a1

  • SHA512

    8af55418f7da06de68aa36b90ad3090d95b1b658535f24872146b537b36e4853575cbbe4e541e8d79ed7cc14c7b7727a225a82343026ade679b0895153e2b2ec

  • SSDEEP

    3072:xB5TkvFp91I0WK3W1OPAAFNyQE02HPS0aJE8e8ho:xLkN1I0WK3WiyQE0J0aW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4596-194-0x0000000002DF0000-0x0000000002E20000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections