General

  • Target

    2392-314-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    a617cc8df0fb34f15246149a44e60d2f

  • SHA1

    73f9473b29ff0c1b52f0ef5544a14f8bf614610e

  • SHA256

    1718ed62a4ceb9396d9a9adb154406a424d1743192cf1c4bc3e328ea702f279d

  • SHA512

    f5a13fb728b2079ae9782bbb0d9f31d30648fbb534621656a4ed18ea8b853b6c2c52ba21b0dd323d346d5b08719226c513ac23401ebf5fe9c6072a2eb5e46226

  • SSDEEP

    3072:fEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadg:fGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2392-314-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections