General

  • Target

    5172-631-0x0000000000780000-0x00000000007BE000-memory.dmp

  • Size

    248KB

  • MD5

    985966cc32415a4befbd340eac85d237

  • SHA1

    93ec9b6d064466e386e486cd6bac0c68ca62b3c0

  • SHA256

    2ad71b89296db41d81417eee1ead5566d1bc3ce48889a5b285fc3045d7f330d9

  • SHA512

    e54edc720fef4ee74304c3cc85a2e10cd5301b1757c2be7b7020a388cb2ee6019cbf7836cab1d85a74bd0054531a89a6d8585239ad42a3acff3aab972c128773

  • SSDEEP

    3072:sEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmado:sGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5172-631-0x0000000000780000-0x00000000007BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections