General

  • Target

    1772-55-0x00000000001C0000-0x00000000001F0000-memory.dmp

  • Size

    192KB

  • MD5

    52841d63858f4ac9b229d1134c34dfb1

  • SHA1

    5ca6af7ffce65a47dd45ef391e9bd471cf4022a9

  • SHA256

    594774b6dea01b4adbbe00a2317f5067baa1b22d9fe098471f9877d3925634aa

  • SHA512

    c36839280d9ba700a6b01198dab75091377ebbef7d1ccb88c2d48f428e5486bef282698358bd3765b7c3c5ca9b915de5c86be4b3bbe7bde5b548d45072ffe9b4

  • SSDEEP

    3072:8wswJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1JA8e8h3:8dzAmmI0k7vVe0E0YIM1e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1772-55-0x00000000001C0000-0x00000000001F0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections