General

  • Target

    184-171-0x0000000000B30000-0x0000000000B6E000-memory.dmp

  • Size

    248KB

  • MD5

    3eec85f1f803377c226658aa6e30bd46

  • SHA1

    d10e9eaaa0f5f794f98102366cfc17a0e380517a

  • SHA256

    51a9f131769957c0879f08f8ef13464d312aab5de369223e73f47c179355d42b

  • SHA512

    0c1a85a23ace9f2e7f2a4dafb9ef7c155c01d9134fe17a3302931796e82afcd52e66076ac483eac506ed7625e9ae59e54f409985f1e176a3f19d8edf63f0e426

  • SSDEEP

    3072:hEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadV:hGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 184-171-0x0000000000B30000-0x0000000000B6E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections