General

  • Target

    1704-658-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    2af987280b075d67427ecf80834f65c1

  • SHA1

    71078fb52347dc8b000990932cdde7f152e63aa8

  • SHA256

    ee6509b5920a7d03aba3c86cb1f1a4b977d7f4038e80c3d7463e0d5a202704e6

  • SHA512

    5af7e69913a74e4163541c999ebb98b74cf008ef2f56e7836a2fd59370b35d5a21eb375d3ab952bfe0d37ea32221c6f5ab41fffdea6fe2decec2a091fea5d218

  • SSDEEP

    3072:g3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:geGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1704-658-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections