General

  • Target

    2100-878-0x0000000000080000-0x00000000000BE000-memory.dmp

  • Size

    248KB

  • MD5

    1dd7e17fef51e830d1af9eb5304028da

  • SHA1

    932aabec7a19183a81215f8d54c6dd60bbdd0502

  • SHA256

    1a47072062c5adad4e83b1e6faffff212d712715e9d1e12b5703b5520269d8e3

  • SHA512

    00dd76bc527867d69677c61552ecb3760c85d86be3afe281bdc1b01b904ba5ad36fb3fa3c80117ee3346a6a8eabe2b9e03c1d2fcbe7798033693c87d0fef8c76

  • SSDEEP

    3072:PEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:PGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2100-878-0x0000000000080000-0x00000000000BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections