General

  • Target

    1408-350-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    e28df387cea2a6dcde08d8b5b8304457

  • SHA1

    f60f37ebea9f7ae799168daef329e33fe4466e4c

  • SHA256

    4ad40ad801238deca4a7ff9e0de9188e69849fdb02645d731f8f85cc23c7f9ed

  • SHA512

    674a63c8ef2f71b77da7068ab1e7d6a8a7c745f2852e7d9497f4211faef9d884b458ae68a65d5ed46e924c771ae9981d684e7a068d6df4d236e2487f03f42ff9

  • SSDEEP

    3072:kEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadg:kGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1408-350-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections