General

  • Target

    2556-34-0x00000000001C0000-0x00000000001F0000-memory.dmp

  • Size

    192KB

  • MD5

    4795c20e4139ea458ec0bdd438e87c0d

  • SHA1

    c64aaf5dab4be9186c7447dcad2a95d48326087a

  • SHA256

    cb44927decf2fe9a008f9f71908205879fc9922b264c3c84e2574ff2a4557a0e

  • SHA512

    0dcad2193e58c6576e2340aaf464dd7a104cfdb5d4293b1d9c5df09caf064029699d3fc1b199743508a3e4a5c576ce009f466d36302569c1da295df9db860892

  • SSDEEP

    3072:8w8wJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1JA8e8h3:8NzAmmI0k7vVe0E0YIM1e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2556-34-0x00000000001C0000-0x00000000001F0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections