General

  • Target

    1968-206-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    c80264db24508f6789aa716811312fd3

  • SHA1

    d3f3e30c3d9cd491bf2f1c6b63c5bd710aac5713

  • SHA256

    b6ebf1a63f895fa02636aa2beb0246e12d76f2db0e8aa1bda4db0a553f4157c2

  • SHA512

    90c8d21c67879cc4b05ce80ac691145f7ecb24a90f5d5e27655f0ac7dfb7f2c35bd03c02e02cb17e386fa4180a71ec4dbc15fbe5ebe072b33f22d54656771099

  • SSDEEP

    3072:/3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:/eGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1968-206-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections