General

  • Target

    4072-305-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    205b01d66c98a7dffacbb236be1e7bb3

  • SHA1

    9c8c86e8bfc24cecbba02daa35b755f58376d036

  • SHA256

    de049e78c016d7a9b69c8208022e9ef2410cd9b0692cb8faf6e2c17540b8f335

  • SHA512

    a8a7627a26dfc23ce7032cf1b4151607bc6b437c7eb46ceb5392b18cac6dfd27fb013f19331070cc73a570d05f8f1e470924936352545eb505148986f70266e4

  • SSDEEP

    3072:E3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVRI:EeGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4072-305-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections