General

  • Target

    764-207-0x0000000000250000-0x000000000028E000-memory.dmp

  • Size

    248KB

  • MD5

    898ffcae2c50561b392832f879687f19

  • SHA1

    c7c4057c99ad3669324e615d9be025a799f25d93

  • SHA256

    9add34d08e046e676316ae9e8b8704c3fc73ecb220b2765360bcb5038ff77136

  • SHA512

    994d757677005759d38d759be589463f6264398f54b0b9407543e03b8cd586b8f6095f9fed1890dbac1595cc6e37e8506da1f3db72ee0d1eb622ccbea9f9db16

  • SSDEEP

    3072:HEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadn:HGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 764-207-0x0000000000250000-0x000000000028E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections