General

  • Target

    2800-3479-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    33a184c768e5f9fd89a0522a25281db3

  • SHA1

    0332ef66b46a7e8b60234e524b43b2c79221c3e1

  • SHA256

    8bc4d29b7060b89cc396eaafc6ac60a61ec96dbf8b556beac9eec417f622946d

  • SHA512

    b51e0c4638ba37f93db40e562569343ed5e6e34d5c2798d07a6080380e1030a30a469f5cdaf6c29ee2368dcd387d9040207d257827d09a5e017d284d12170edc

  • SSDEEP

    3072:ALFcZeJmcnqBHFqxNsyJFkPh/Wwa8e8hw:AF215FZRPh/Wwa

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

top zaliv

C2

91.103.252.165:5977

Attributes
  • auth_value

    56b880f85b13c1a761d965d33296ec81

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2800-3479-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections