General

  • Target

    1556-1321-0x0000000000080000-0x00000000000BE000-memory.dmp

  • Size

    248KB

  • MD5

    6da2c1e71427668f397be646574ac256

  • SHA1

    4a1f11989a1c110985b70b13a832c214280c94ea

  • SHA256

    9bc316da469efd54127ae65cea46e1cea0123f99c39e3eb9dae999a6e66d8e55

  • SHA512

    5d752ea8db5592361d84f15bf37b864e6f7ba37c19e3b557d0ad5b30166938a4e01794b29e0a565dd25029b2811ed5811453d02240b779338e0becec8f20e9c4

  • SSDEEP

    3072:LEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:LGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1556-1321-0x0000000000080000-0x00000000000BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections