General

  • Target

    5392-665-0x00000000011A0000-0x00000000011DE000-memory.dmp

  • Size

    248KB

  • MD5

    c1248aa30ee989f2495eabc94a670d6a

  • SHA1

    dcbf39e3830aff67edb2c83d6f2057a72bdc2404

  • SHA256

    11f9b119369b58e34a9a75087766e0bc7183a8665a434f413d9ec8022131b5dc

  • SHA512

    b3181e3baa699a31df248562bf20a84e830f870bab2209b09c02baf2922dc8a45747b13b87ffe4029a7ad04b17c6b5a1dc85c8e7af2d32de2c71142fbf3921c3

  • SSDEEP

    3072:jEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad3:jGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5392-665-0x00000000011A0000-0x00000000011DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections