General

  • Target

    1088-330-0x00000000001C0000-0x00000000001FE000-memory.dmp

  • Size

    248KB

  • MD5

    911543bb28d4c86ad70a43062314422d

  • SHA1

    8a47437f14413d4a29ed266b89252c2548ee138c

  • SHA256

    623006bf7f82ebc1a0e7a5f841341733bca84c7e3c659f2dc095a5a8b8f18124

  • SHA512

    d6d638c27ad23cab826a32a116d64d4d99539489c6eaa7e16ed419a075db445f43dc4243611a333ec4dd63d9ff8f91a4fc299cabb5eb644bdca696ccf0c52cdd

  • SSDEEP

    3072:TEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadk:TGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1088-330-0x00000000001C0000-0x00000000001FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections