General

  • Target

    2780-560-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    8e6807b92f91989df6813e212f6b94cc

  • SHA1

    d1e4c670a382a3dffec39f8d94f85fa1001ae153

  • SHA256

    927de898f0da7f0e7db48931f0de670ce5ee6048908aa6ba912d881a6f3b28b2

  • SHA512

    c547e5d83177ee5df7aca929ce0529164b8f9e94c559e65c5713604295bb1a9bce440d227e1ecef55590b671e0c09b92376abac5aad3d9f7e6726335aae7b753

  • SSDEEP

    3072:zEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadg:zGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2780-560-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections