General

  • Target

    1128-0-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    870cf0aaa3efddac5c0beb8936b2bfdd

  • SHA1

    90c565e095094e0daec353aea7d88c7bcdbe00a8

  • SHA256

    287a1986258e667ddd3dd868bff7416f85f22b336f5c17a89fdf2d1ce545a3f9

  • SHA512

    4b8368119aa72a21b35a1b32f8d14e4ff9dcce0f77d5d435cf09a417ead3ec488c84b44a899c1905bb22b4cea9c3daeedc5b8dc18f139d910a4b9e2374f62198

  • SSDEEP

    3072:/e2wJ/jponHNgcBbMjPvXxxuPCet/qTjmuKslB1sq:m2E/9oHNgcB4jPvxxvw/qmuKQ7

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

unique285

C2

194.169.175.232:45451

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1128-0-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections