General

  • Target

    1820-1289-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    b7fc001c03227468457dc1f79907b879

  • SHA1

    7eab67ea8193c91f9b13665c9401d88233a4c9be

  • SHA256

    e0ac0d2c4ae3c751102fca83b284fa768a292e7279501d392e591ead31c63b29

  • SHA512

    d7805597a9e4509af99fe0bac8e0cba466d906dc870c2640df46abeedb5602d1ac9800c4bc2107c72f32c8077db19085dfe1f3638e4bde2b4db255f23da5660e

  • SSDEEP

    3072:l3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:leGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1820-1289-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections