General

  • Target

    6000-215-0x00000000009A0000-0x00000000009DE000-memory.dmp

  • Size

    248KB

  • MD5

    56d43eeceaf24387eb508cb25e1b7d20

  • SHA1

    75cea51a6e0f149b0af62eb46763deb8002e467b

  • SHA256

    a62350100354054dd25224151263558acc4dd5439a3937a5e0fb012bfa59cc51

  • SHA512

    bd138b8eed543c19f6e3d602378223591c39bf77ab407baee5ad40802ad26574ee8f2efc9df677038ebad4d5e165f615ad4f03ba6f751867e52f3cbbbca976b6

  • SSDEEP

    3072:KEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadC:KGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6000-215-0x00000000009A0000-0x00000000009DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections