General

  • Target

    2372-1205-0x0000000000080000-0x00000000000BE000-memory.dmp

  • Size

    248KB

  • MD5

    3d594f774479899dcff32b65118de276

  • SHA1

    fee6bad9bcabdad83da103adc93540b60c66798a

  • SHA256

    f4101949fe2c56776f3b6eb3f2d03d1a7f53dd8c840e54813853e36b81b63069

  • SHA512

    4f062a8cb94eda65aa61fe389035d217fc4beb497495bb2a417b63b1e24d32baba867af1f2865133e3cb1eb60b162226a7ad228c1adc0c3407b491d04ac53441

  • SSDEEP

    3072:bEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:bGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2372-1205-0x0000000000080000-0x00000000000BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections