General

  • Target

    2124-1276-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    e2e9ec04f15a97d9a847e6351003cf6e

  • SHA1

    e7320bac2e2016ba8a6beb415b8fae43672c9458

  • SHA256

    35ace1a6659cff8ea8dc23c38cbff52df205e4e2f3f0654a808f438a64a63c6d

  • SHA512

    d25d0a113512ff8ea50b6e60db4d4df2df362195eedf4fab13e4e9fce8c9fff5493d7ee493c7ef8f8a88284dd14befb5a93983f74a4a9b168fe69cd63000ac1b

  • SSDEEP

    3072:UEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadg:UGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2124-1276-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections