General

  • Target

    1788-69-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    c7a3f51f8a068c8a2d9e30e38c298160

  • SHA1

    0d0ed8ce566b1fe4fe6cdf91a351108fb8d09657

  • SHA256

    1160cf502be1c7f678f1c82b6dd062a4a2d2d09004a5cfe940c8c60cccddec8b

  • SHA512

    c2f7223294027595b44ae48d6c4a370f74132a4320575737f0fa995d3d7d1b4e56ca034bc7a080e38e803e6d42007f47c8ec796d193c0735da34df1a4bec269c

  • SSDEEP

    3072:kYljUmmjBI0pG6f5OMS7tTT7NLQhQE0YabQpxPQEuvJd8e8hL:pliBI0pG6fHhQE09bSPQEuvb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tako

C2

77.91.124.82:19071

Attributes
  • auth_value

    16854b02cdb03e2ff7ae309c47b75f84

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1788-69-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections