General

  • Target

    3016-515-0x0000000000080000-0x00000000000BE000-memory.dmp

  • Size

    248KB

  • MD5

    0bec03ace8ade2ae1351e394399b5fa9

  • SHA1

    762cdebfdf5488b0fedceb8902d8268fce64c12d

  • SHA256

    434b23354f4ab370eb6df0c1fd62e8f5580c2e9bd1f316801fd626ece8eb5aab

  • SHA512

    d89dbc6b84ecf195775318e77f31f889f332e572093518bb1849e982f6909401d9fbfec4f4600d9578d5cb5058fe479c237b84b5540dab5e29e6d7abf63857b2

  • SSDEEP

    3072:DEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmad4:DGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3016-515-0x0000000000080000-0x00000000000BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections