General

  • Target

    4676-51-0x00000000005B0000-0x00000000005E0000-memory.dmp

  • Size

    192KB

  • MD5

    96092d9c6af6249fa2501002e703c3d4

  • SHA1

    51605bd4a42daa828cc81e0362fcee527bbdca5c

  • SHA256

    2b9c1f82ad914c3813e77ad72844048ecdbf6fb91d658805c2960e49db327a89

  • SHA512

    15f99b9f86b82caa39120c387c35390b20e6b769f23843061da5fbf51d1bc40779d924f03bd3b9c65a8711c8751689ca4abc63482a7a1794bc798b7655071101

  • SSDEEP

    3072:8wnwJp8A/xdimI06X7vV6OPEsUc/W0E0ilHPgM1Jt8e8h3:8SzAmmI0k7vVe0E0YIM1H

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lux3

C2

176.123.9.142:14845

Attributes
  • auth_value

    e94dff9a76da90d6b000642c4a52574b

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4676-51-0x00000000005B0000-0x00000000005E0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections