General

  • Target

    1136-1260-0x0000000000080000-0x00000000000BE000-memory.dmp

  • Size

    248KB

  • MD5

    438ef9f7d3dd484e601a20450e51b761

  • SHA1

    759cac6591037d8b72df21b2bf0bffbdfd3c5294

  • SHA256

    b158be933bee846664894ecae1a7a40c8009f76c443774d2f72c79d98530b1b4

  • SHA512

    3a2c49b0fe7d727fdfd708f7f15465aa4529f8408fdeeb7bbc63b0c71fdaab97c5394ba27c658914f7acc86a914c0df5b740eca355157dd766f581bc92f473b9

  • SSDEEP

    3072:vEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:vGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1136-1260-0x0000000000080000-0x00000000000BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections