General

  • Target

    4360-0-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    8fbee18c3f452e3b81d5825cc0ae5344

  • SHA1

    67204e72ce42e14de73f67a663699c282816491f

  • SHA256

    64b2d811e49314d29ab7259672cec6e4d684d3fab51da793f827ed2000f00b23

  • SHA512

    f3e1ae2790fd0ec7a10b405508c4a996ce5e2b311dbd2eff681fd949ef0937da9d8fe7dd801a9d5a27be0b136ad4f55f7e82f4a58fa233e3c5d5c4481766dfab

  • SSDEEP

    3072:3ElKthWFjI0SdbnhOibbzHDvVC3jE0i1rUfoTzmoJg8e8hO:EK4jI0SdbndrUjE0bfoTzmoG

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

smokiez

C2

194.169.175.232:45450

Attributes
  • auth_value

    7b7d8a036038ab89b98f422d559b4f8f

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4360-0-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections