General

  • Target

    808-1-0x00000000001C0000-0x00000000001FE000-memory.dmp

  • Size

    248KB

  • MD5

    9b8d34f68af2e3539b86d3c95257e558

  • SHA1

    9033c5eb22cd1b04891dc863a1bfee2e0ab829c2

  • SHA256

    e7e6610a1fe770c57f07aee33a1f1320179b3ff4ad5578af349a888016949a07

  • SHA512

    8cbf15f131026bc0284be56a1da4e036c5da4b599384d4d02b0233618c63e449e41630830d344a67f3f6e54db8d58eeb076fc5d0f8d0b45f5c7e9367b920cf1a

  • SSDEEP

    3072:s3Emyn4NgcHbTfb3UgH+5Kcyt/qDoThyiOnqWCLdkl:4E/4NgcHbrYge5Kj/FThyDnLCL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 808-1-0x00000000001C0000-0x00000000001FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections