General

  • Target

    1748-1319-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    89507524916afc4c3f53bcb1603ab5b9

  • SHA1

    20c65caf1c249e6b912ee5c78ce0ebbe5480eea3

  • SHA256

    7db109d821eeb164bf2be0b1db17d347634cb94042925a2c4fdfb12cef356e3a

  • SHA512

    997d4321f96859c795ce2c4a6f3703c21859551cf0dea45dc00d96edec9132760302abb8c7cc4f8d98acaea6952e1b8acd945361a0033915dde7dfd58f4be60b

  • SSDEEP

    3072:3EjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadg:3GTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1748-1319-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections