General

  • Target

    4320-304-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    d0001b306d3629bad0a511efd1038e31

  • SHA1

    20921095de6f0a6b1aa6dc2e8011b846a73dbf8a

  • SHA256

    3fee9cbf4a7b80cabd199132cd3c36713f850149531d7c6b20276d6c6991ec7e

  • SHA512

    3009c9c93a86e99eec4b44bd7dd403c42d43a8a54e8aebe499489bdac2f6af7a8d32a76ec912b12b7bba085791e60b1ce27b299f365a34ba74206f4ecc6bf549

  • SSDEEP

    3072:l3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVRI:leGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4320-304-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections