General

  • Target

    6116-431-0x0000000000F90000-0x0000000000FCE000-memory.dmp

  • Size

    248KB

  • MD5

    1f10403eac3d60a6a28722a7dd932d2b

  • SHA1

    2aa77f6e863105709139f3ba781f4dbf566e6d7f

  • SHA256

    a2246f5b81f91103a927741962412761c65b6527ef06c7b2825b1040126e2895

  • SHA512

    4bdd7f9f0bc1d4a9841cfa1308ca3c8052e9fb6b9395836f76659ccf9c1353a222ae7f849d51828f923d82dfbed1027d7299daf78e30304bae2d5c88c3290d91

  • SSDEEP

    3072:7EjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadj:7GTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6116-431-0x0000000000F90000-0x0000000000FCE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections