General

  • Target

    4764-280-0x00000000001E0000-0x000000000021E000-memory.dmp

  • Size

    248KB

  • MD5

    946b3604c26528ab1eb0ed6021ad4432

  • SHA1

    27987754050037d1bdd3f5084ac63352d6afb09a

  • SHA256

    346d739ef51c5e7ca7d549c634c345340d29be882f84e000a79e73543e67b5d6

  • SHA512

    c571e04810c1737a347575790d57a507eac0aae0ca873075e906d7aa629296990eb75726ce09fe40e5425528f31d124ba80b8a514e528d7f751069080a4cadc7

  • SSDEEP

    3072:KVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLa:qyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4764-280-0x00000000001E0000-0x000000000021E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections