General

  • Target

    2120-562-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    26b67be3155766f3c3b1d063a2823284

  • SHA1

    a518ae62cbf667dffdffc9c628d9c62b9328fdc9

  • SHA256

    bb2e273eceb569c0aa226ad007473ba4092288844c0151f1df124387951bd882

  • SHA512

    1fc7b918764cf5be443e659f3f8a61a8bda08d8f807beeabcb9287b6326a032cab7d6de4c8fb83f24c3d5719f22f69122c54a183215131d8908803c98348167d

  • SSDEEP

    3072:93HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:9eGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2120-562-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections