General

  • Target

    2068-437-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    a890638df8701a58ecc008f01e5e9244

  • SHA1

    69001aaf842e0ec44cb787514bcd9ea1b6297d30

  • SHA256

    a29aa46836216c782db35f14781a364e24472a2cd3a8db0d2197195eeccb09fe

  • SHA512

    e78ffb91696c3e334fa75ea8234ab9377ebc431c06e8a5290db9594b47dc20a75d0cbd7effbb53f4bc072d2450425f0cb4c32a0792ce655f357463c96597be18

  • SSDEEP

    3072:g3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:geGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2068-437-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections