General

  • Target

    3936-628-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    6d55d0cb6aac8ee6df70e00ff5425ba3

  • SHA1

    3a5cc22d8b1e653a45df7c0a8d0e762d72367b9f

  • SHA256

    f9aaa56d636cb54797faa3f6e2f2899a401ba19832e7f7eac3cfefa61ef4f9a5

  • SHA512

    65aaf3e8676953fa95166e8da7e80219f03eb89221d858d53151de21066191aeb1e4e0c64df059de27e2d807fe8f067de8ebf59b3a38bf8483da3f9ba1259b41

  • SSDEEP

    3072:43HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:4eGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3936-628-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections