General

  • Target

    3068-148-0x0000000000F40000-0x0000000000F7E000-memory.dmp

  • Size

    248KB

  • MD5

    966e3520b95105bc15e569f4b0eec821

  • SHA1

    bed4b46c8faa539bd0fc1d3041849a71770d57a5

  • SHA256

    5f6f6cbceb0f750f20ee9710b47092d6b4a08645e81de14343bd1859dd89a997

  • SHA512

    9dccaaade9bf7ab64bfa75c0bc00f823f677b3f8b63cc16d0e5fc13012e390987b77d4c945fa7fc8e7c0b4bdc412ffb5b790fec6707a510615ca246579bf7e2d

  • SSDEEP

    3072:YEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadM:YGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-148-0x0000000000F40000-0x0000000000F7E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections