General

  • Target

    660-701-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    95c412ad1162af0b683232d8b689114c

  • SHA1

    47c2f7c40801c41e8e10817c57300a98810007bf

  • SHA256

    aec42d2406f60e7ff24863b8d2ae2c41fd5afdd2e2596056bd5d0a3d9d94ba94

  • SHA512

    559972f97a0c7a8497e5cc60d845ffa1f264f26605f1723a724c306f7cde5dbc2bc202092be9ddf0add13b8d9cba9d1a4f99ab7ffd2bce63f3e68c255f855cb0

  • SSDEEP

    3072:s3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:seGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 660-701-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections