General

  • Target

    1600-1177-0x0000000000480000-0x00000000004BE000-memory.dmp

  • Size

    248KB

  • MD5

    de9d1c2faaf28ff2b17484bb6a7932ba

  • SHA1

    47f650e4d866728304574bda2e4f55991048e1b5

  • SHA256

    aabecad76f8461ecffc7f24ae634c5119d032825259f7bb4b715f9e210eefe7d

  • SHA512

    4f4165cd7b95f17ead3735dfb5e73ae957ef656dfb8833aee90cfec64deaf701bca9bb053623421773ed7e11aa6e94b2fa0d8bfed95a5f9b95af488483fde6d1

  • SSDEEP

    3072:TEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:TGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-1177-0x0000000000480000-0x00000000004BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections