General

  • Target

    2752-4-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    e724607dcf4fda5e2db14d8df277e344

  • SHA1

    a46256c8d9c60e90fc2948be6f1b693110b20477

  • SHA256

    6f975bb3ee6a67e38a87c8af3e9dfb9712c70febabf8616b34023258e35c4f90

  • SHA512

    ab7140de6e4da937c1b0186f67d55903cffd662326926b5feaafb63e4ff9e6d2c7a3d26ad4bf5eb2c203ebf3aa4be3b2963dfb83cb33cfe0eef7795fe951846f

  • SSDEEP

    3072:SU3wkV/14I0knO4bLOpRG5p6QsE0CCGgGpy9J08e8hc:SUL94I0knO4bL6QsE0DGpy9C

Malware Config

Extracted

Family

redline

Botnet

LegendaryInstalls_20230918

C2

62.72.23.19:80

Attributes
  • auth_value

    7e2e28855818d91285389c56372566f4

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2752-4-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections