General

  • Target

    1668-1016-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    db3657c3b2264769ff544b043b6ef70b

  • SHA1

    5debafe2c7334cbbfbe990a8d3e3f325d97c48d6

  • SHA256

    bb3fecf2abfd087ef4f3ba3a9407ab3c04478986b7e2110491a2c2747180d5fe

  • SHA512

    b0762e012e89bff339e7263dd013c40095fab462667015bdb6b4c0ad2236bb61eb5ce75147b4c06f340cfa1b0baef7c0af82aafe2dfdce4f4836de27c3dfd942

  • SSDEEP

    3072:I3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:IeGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1668-1016-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections