General

  • Target

    2956-129-0x0000000000D80000-0x0000000000DBE000-memory.dmp

  • Size

    248KB

  • MD5

    57939e562710dc3c36cd53b0d0391b89

  • SHA1

    d9b42e3b1c917dabec6f8ce9f299287cfcb8a01f

  • SHA256

    5ed3733f5a52f89eaf42c6503c611ac0361aff8dbda1a87af18ef9c2e5f2dcd2

  • SHA512

    0957c1ac1c4c31eed2653283c83d435676c4a7a7c0b03925bfbdff14d062388cbf9e146d9ce550c50f20685135b08fed7b41c36dd90d9989bdd8b5441d792100

  • SSDEEP

    3072:MEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadI:MGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2956-129-0x0000000000D80000-0x0000000000DBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections