General

  • Target

    5500-691-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    4aba4e4fee6c37d7fb429ef9a24b6ce2

  • SHA1

    42bafee378d7b3a55a6eaa0687cf174771118179

  • SHA256

    383200fd273d68b51c0a2cc9161097a3a6549a441b35b321077aad1c339bcbc1

  • SHA512

    f53e70a93f36c648b0e417b6a1ee88162a486e037ff5bc8012d42819e4147b55d05410f59dd34dfd0c88d44349c4c6e1899d31bc2fc6c318f0324fe09c03ea42

  • SSDEEP

    3072:B3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVXI:BeGKDRAXb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6012068394_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5500-691-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections