General

  • Target

    2068-167-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    858392d6a02e6e71a918b3ec0d81eadc

  • SHA1

    3c71d72c7179eb14be6d71db37cb19d6c2fac215

  • SHA256

    4ea0f85fda919bf75643bb97c0b8cea2da3bb7f812f0ee58d40227aa5f7cd14a

  • SHA512

    c9a311ac32342d7bbff31779af55796e0be881cf6529e5d07228d85896a0649ee0fd3fcbd9ff6ce5fa0965cfbc30a1efb176b0ebc1eed53a688e1c7677a3138f

  • SSDEEP

    3072:g3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVX6:geGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2068-167-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections