General

  • Target

    5576-312-0x00000000003C0000-0x00000000003FE000-memory.dmp

  • Size

    248KB

  • MD5

    ad01b71039328d78be5df312fad1e3f9

  • SHA1

    e7a212d28a5429d6e8fb8c1cf89ec8fc94fac054

  • SHA256

    c19d5e058a13147c046a256b7101be85dacbc58dadd9151426725cda71f6f293

  • SHA512

    aab2473c87a2b5075a292f0ee9a23217e2213a25865fa381693fe6e003f9aab3e2e9fca6d7265197194aba3e589cdbfed2cd9f4203f0313dc4b15eb2433904b9

  • SSDEEP

    3072:AEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadE:AGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5576-312-0x00000000003C0000-0x00000000003FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections