General

  • Target

    7872-2092-0x0000000001000000-0x000000000103E000-memory.dmp

  • Size

    248KB

  • MD5

    e505a196f3beb515562ad0300fe9631d

  • SHA1

    ddc64064d5ef0b8269169f4616b01e26ee1675be

  • SHA256

    3ab8ad46310ee42c5188cce20f5009a56a4ab6d691fbd64d04e28658be660a73

  • SHA512

    5c0b9d77580b388d5d8b1ec30bdaf26e1a91d88cbb7242e85336ebd7f1b77a254830afe7972feab73ddcb85f2f6bb8b22a23b6ce4a64ed7ae2635c411f70234c

  • SSDEEP

    3072:uyng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtza:ng/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7872-2092-0x0000000001000000-0x000000000103E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections