General

  • Target

    320-770-0x0000000000080000-0x00000000000BE000-memory.dmp

  • Size

    248KB

  • MD5

    b9f23933cae5b1ada39dd0da65f807ae

  • SHA1

    780ad2e3a2cde41ac0271f79557a987b9912815a

  • SHA256

    0d62e7c5afb51b3009bc5f33ddb58e1a2c2da80f8e7230c5f6731acf57433240

  • SHA512

    d6f7f560b16481345c11a913b71c3894da7db2498ca55f11b71fad735385857ad4ad3cd2c6866b74c5b946549eb1ab91b3139706fa677de59faaac9718e7c0fc

  • SSDEEP

    3072:vEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:vGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 320-770-0x0000000000080000-0x00000000000BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections