General

  • Target

    1272-1235-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    e16378d79a67870fad3b7f05f2f65001

  • SHA1

    de124df9021c462bdd42cf8f21770365599c2870

  • SHA256

    6ebbc9dbd2ed9ad1b23834944565f790f060a8270a5acd609c2b6ff26401c146

  • SHA512

    6a9caa02937ee48a67e3dffa0aa7c9092fe47cb36ba80424d60eb20121ec05598f835a62e084ab2578526c788eac3f6a17a5acdf1bb5b25fe6dc49521060a693

  • SSDEEP

    3072:PEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadg:PGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1272-1235-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections