General

  • Target

    2096-177-0x0000000000370000-0x00000000003AE000-memory.dmp

  • Size

    248KB

  • MD5

    fa7a17f3a4434a11d40aa0bef6edda4f

  • SHA1

    d79ed7eefcc1abb12c90a3a75452c0a461f22793

  • SHA256

    0fc71bdec4e5034be83dfbc953b2c0c229c9a954d2eeafb2d6506dda5111cc9d

  • SHA512

    521acc23d1763da115ccdd4af693c6b91d585bf995bab6dd7ee900470df55188f0406069b9ab4f4ee5ecd02cea2a6978191f41adfb6d28bd6ce0b97d7766410f

  • SSDEEP

    3072:FEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadx:FGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2096-177-0x0000000000370000-0x00000000003AE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections