General

  • Target

    4212-234-0x0000000000170000-0x00000000001AE000-memory.dmp

  • Size

    248KB

  • MD5

    b2d4a1b8a9a3fc08fa7607a40357689c

  • SHA1

    74ab4f000c4613de5ccb3e5f70790d1f46b92372

  • SHA256

    f1549df8fc20940eb308f46edb8dc224a75a7860b81130e12f3d66bc4f32c540

  • SHA512

    f535571baea37bdcdb774b026aab1b38bee9e9f136eddf750aeb77b901daf7ecc4881771bb02f4ba3a0b293289cd8763c219a3046359ecaa6f66e9deba366164

  • SSDEEP

    3072:lEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadR:lGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4212-234-0x0000000000170000-0x00000000001AE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections