General

  • Target

    4920-29-0x00000000005A0000-0x00000000005D0000-memory.dmp

  • Size

    192KB

  • MD5

    4a7d39f96842680fbde9d4335d70de83

  • SHA1

    57c822be6158616ad7fb76ce6aad0ccad24b05be

  • SHA256

    3e23b9bf8032b880647a544fc807ea4c705f2c7f68a2b30e5d989ea31d3acec2

  • SHA512

    646225226767648cd83bb13c853fe553f0a4d9f2e86157b486ed87d596fa3ff9f988ae28da09904f223a325fcec15ac88221ad40bc95b7ce56cc1020d866c268

  • SSDEEP

    3072:8wCwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1Ja8e8h3:8bzAmmI0k7vVe0E0YIM1s

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4920-29-0x00000000005A0000-0x00000000005D0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections