General

  • Target

    6008-705-0x0000000000200000-0x000000000023E000-memory.dmp

  • Size

    248KB

  • MD5

    33cd5b20f17f707ee99231a9a7740ec1

  • SHA1

    61ff4ab53f2c03e4a2cd7e316a49e1ff1a8d7d87

  • SHA256

    8b3b1fe6c7d575ebd380d94a78ae5e4330557aa0fffe9d0d82049192a11ee793

  • SHA512

    45ae58e82c25b23549d699fbfeafabb1b782fcb812fa6560f78ab4bed31878d418d3295d15716ba12d12ff02af2df8cf8c6b647560012e17ba22e17a6e21dfa9

  • SSDEEP

    3072:UEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadA:UGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6008-705-0x0000000000200000-0x000000000023E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections