General

  • Target

    1300-342-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    3f9d92d1f1c86316b6295f2430017f2a

  • SHA1

    1e3a6cb89484a0e77ca2ea5a05d3bc2a4dc07327

  • SHA256

    d4f16a667ee184654844dc7f2307a75967983b360ece4abefab55c302fa98273

  • SHA512

    1acd2d1623912a8624334a8946225183f7ad73066409fcb8e8b7557910bc1b481ce18e5cea3b0439f6e5578d1efce84067b741b431a2d4cc0d4c906906674d5b

  • SSDEEP

    3072:t3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:teGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1300-342-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections