General

  • Target

    3020-0-0x0000000000090000-0x00000000000C0000-memory.dmp

  • Size

    192KB

  • MD5

    beaf460f1f43792bd51d977665255ccc

  • SHA1

    43397c729189c5206697c54cb6829ff4874b8b0c

  • SHA256

    f94104caccfe9986c76ae0d657959d26686df4150316146723ee137ab6c589f2

  • SHA512

    e22d4a0c5f5982b7c7f0081f94aa22a6ff1dd09bf5df7c13a6d2da253cd1b8a001c4876b4596c77a3f9df30e2de821823f489c60c19ea25401d371383df2c7b2

  • SSDEEP

    3072:eB5TkvFp91I0WK3W1OPAAFNyQE02HPS0aJA8e8ho:eLkN1I0WK3WiyQE0J0aK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

0305

C2

185.215.113.25:10195

Attributes
  • auth_value

    c86205ff1cc37b2da12f0190adfda52c

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3020-0-0x0000000000090000-0x00000000000C0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections