General

  • Target

    1704-1-0x00000000001C0000-0x00000000001F0000-memory.dmp

  • Size

    192KB

  • MD5

    b22b9ccba2b81512d06981d3a323df0a

  • SHA1

    b503aad79ddbd9fed4f1bbb7ed6a2c42b592e435

  • SHA256

    f38760d3895fe9a8164a1023e14cc6dfa0c161401f4a1f000ea916e47c95d2e8

  • SHA512

    680da61bdd981aac517d2fee34c1594a6fb8c1b29bcdb40fdaa457eaa29a47d33af6dfdf9342d0e67ede3d5d7b539f5f566ab7ea3ca682f8a79b0b0e548aab9b

  • SSDEEP

    3072:yL/oHi0aJxB/9KKKKKKbKqKyDQKK/j6mxNtwHrw92j8e8hJ:4/YOxBNY992j

Malware Config

Extracted

Family

redline

Botnet

@DominatorOfMamont

C2

vikaneleneer.shop:80

Attributes
  • auth_value

    37db34188c1a0ff5ee85cb5c06da0d81

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1704-1-0x00000000001C0000-0x00000000001F0000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections