General

  • Target

    1512-645-0x0000000000190000-0x00000000001CE000-memory.dmp

  • Size

    248KB

  • MD5

    4f5fe6e8d329e15d920615573814a76d

  • SHA1

    62233ff652cecd109de59785c2ad4e4c16ecfd3d

  • SHA256

    dbebb8ed000408ea0fdc6af68ce475282d718cd3494e14ddda613e9293da3142

  • SHA512

    1b0938c188ceaeb1fb407ede0e54d36a4142f80a7d286cfe0f4a2043e0ffa2a53938a624692a8ccd64b0b9a23d985db498b065d9cf617ae5918416a8d8786a2f

  • SSDEEP

    3072:dEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadD:dGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1512-645-0x0000000000190000-0x00000000001CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections