General

  • Target

    2720-1039-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    079b389ae96541b4632c45dae5b95c39

  • SHA1

    876feec7256f6de75039424e769e05db8c1f7432

  • SHA256

    f7287c9f8a1d9a6b021585fbad335638ca0458f66727a2dcb75a7d913042ff88

  • SHA512

    a63f8eaabb6f13043b338218d68ad314d27d39077588886b8643b3693b8b6cc7251e301fcf2aa1b4163fe4f98973da97a3cd2fc94064690707b945cce63833f7

  • SSDEEP

    3072:kEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadg:kGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2720-1039-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections