General

  • Target

    2648-63-0x00000000001D0000-0x0000000000200000-memory.dmp

  • Size

    192KB

  • MD5

    d36d96b89e93555d81c82e674aff93fb

  • SHA1

    658a4c78b5e7237b973e705b59a1d42a5a40ed4d

  • SHA256

    2346e5be2b9c4611bb5f880a02caa59fdb3ca332abd6a896053a16d449b72149

  • SHA512

    26d65627bf1427ad81e99e651565e365dd4743b77d0f3a1a93293999bff6ab87835fc57aef48ca2c8f075046a537b7a423bd60f24fcb4c5d1d635b6d76f39042

  • SSDEEP

    3072:8wmwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1JL8e8h3:8LzAmmI0k7vVe0E0YIM1R

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2648-63-0x00000000001D0000-0x0000000000200000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections