General

  • Target

    1052-753-0x0000000001270000-0x00000000012AE000-memory.dmp

  • Size

    248KB

  • MD5

    4292a46a9746ba958ca924cd02a61921

  • SHA1

    fc526b98a62b0e53c2e8cac83e62f1f360b22c8d

  • SHA256

    8a7ed52e44ffccfc91b797e16b3d50d087e9a03bcff42572e5d76a6073f03ef0

  • SHA512

    1093db0f8911a0f7cad539c989110e836df84b0a26b23e6fd4c2e7e4b664dd93ba614f616b194a88274064c53ac3add9564a14183e0448da363d60a647a5d4aa

  • SSDEEP

    3072:Eft1KhmnnoNgcHO5xKBTCk5tLAvPjt/qxHnF3sCw54F:CshSoNgcH2KlL5p6Z/8nF39i

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

motion

C2

168.119.126.250:19180

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1052-753-0x0000000001270000-0x00000000012AE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections