General

  • Target

    1712-442-0x0000000000320000-0x000000000035E000-memory.dmp

  • Size

    248KB

  • MD5

    f5a5a890fba5615b18c3d2258773b3b4

  • SHA1

    b68d2a029a3073ef148e388fbec928b833b0ac3f

  • SHA256

    b88ba9804227ea8d8bfdf9c02e8d9b757fd23e901a40a6cb7671fb8b4446f193

  • SHA512

    6c0abf36fb68e8fad8b2c6f2ddc832f5a5bbbd9bae45685918f712cb26a083146f62f7b207d3ea88605f374cca49cdff5390c1bed4545145bb541a420e741c21

  • SSDEEP

    3072:rEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6GbmhmadK:rGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1712-442-0x0000000000320000-0x000000000035E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections