General

  • Target

    5052-79-0x0000000000770000-0x00000000007AE000-memory.dmp

  • Size

    248KB

  • MD5

    f12c21d9970bf7b4de69760a60a4c57c

  • SHA1

    890b8630cace583eb42c2515a3c9b49f6491d751

  • SHA256

    f18b046bf6bd822b64c9effd38c5bd844ee6ab23f82abcd7cd8550e70b47a0ea

  • SHA512

    941adb102516431e386fb04f996c3248a2ce9ebf6f135f0f6e4ac744d4b9f8d363a31d2554405b0363c0f43789ef1a4efd48b800dc904d1e60c320a20e4f3cf7

  • SSDEEP

    3072:FEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadx:FGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5052-79-0x0000000000770000-0x00000000007AE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections