General

  • Target

    2832-390-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    e4d0a69d6d198b2d9e2c81a8c7a41d46

  • SHA1

    eb925c9e5c59961f23aeeb2ca986126f13ddc013

  • SHA256

    4431ff52d8b0b1a0a80acd0a2ffd343d8bd62f2dfbffcfc2791992d6d36ce8fb

  • SHA512

    ebdcfe278f8305909af4a411103a45b388b28b368da7801bee64de9df7dbc81cefdab0a53b216dfbec085e9ffc80e526b63dd5cbf625bd2e1e5235213b436fe0

  • SSDEEP

    3072:m3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:meGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2832-390-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections