General

  • Target

    1012-1317-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    7d656d5c8a7680950fed004324ccd5d8

  • SHA1

    af16d401b6a4443f7d3a0a3a49280fc6a19a09b6

  • SHA256

    6d6ddad07159b0113bc9df68a8771c0cb425ebc88edb6aa85e31b24ce62b8d7b

  • SHA512

    699eaf48ec0fe5a2961b59d645ceceb3966ac52c3634ed5f157b45f5b4cbd434cf9b63a0f62648b3287de3753674c8c7ab051bd932b2b111c2d40c010319efd2

  • SSDEEP

    3072:H3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:HeGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1012-1317-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections