General

  • Target

    2788-4-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    0d3b11f9e4d2e192b392d24cf1422bcc

  • SHA1

    73b2991c942858ff6e1315874b44150666e86179

  • SHA256

    273c5c16a087ab04c1591a6824e59ea846f5046049446eeca7499a73c5ed6fec

  • SHA512

    689e7e5bc672bba401dc05815599c18bb31aad8e011b957fd6156196fbbab20e935060e013b59df40e9f780fd9b145a9fbf76fd048bb95630a5785892a548fd6

  • SSDEEP

    6144:/Dfq07SNgc+MGmkrS9Ejo/hCy5BUaouL2:7fq6SNgc+7YEjo7xnL2

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

91.103.252.189:30344

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2788-4-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections