General

  • Target

    4932-5-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    b40ec774688c09655acdc57dea4dcb79

  • SHA1

    0ca22e02b1e751ac75fdd65effe6ef9801cd8689

  • SHA256

    19e58fb88c3fe5d1e495076839a144cb68a5142996bc7e395267dfe80d3f2977

  • SHA512

    8ff8d3edc94228efe488e6f6922bcc8145cac9f4f1df721798db330d2ed804aa1fccc2199f06359482c3c8ec7f60a52997685ec50a9847b504a2e454322fe0ba

  • SSDEEP

    3072:L2wokyQI0f1LHfORkZGHydQ1E0meWIrjX/JQ8e8hN:L2bQI0f1LHxW1E0drjX/2

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1405

C2

185.215.113.25:10195

Attributes
  • auth_value

    72cef95c2c9ca50f4250913b3cc1a23f

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4932-5-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections