General

  • Target

    5616-673-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    586ca6193c138fd8a9519d697d52d1e4

  • SHA1

    94048e7ac7f49b92a2d5892909913aae79d4934f

  • SHA256

    0d160f162120add76484ca3db43c6f41e9f43e941f910cfeb96216f91bd41e0f

  • SHA512

    2f2f8497540ba76ec8fb94d0b2ad2b0bde52481403962c4e04fdf9e914958c8b65f4b1cab7ea73a91b0f512208fa177916e9068b2110a7173c1cad0380c73d1f

  • SSDEEP

    3072:t3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:teGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5616-673-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections