General

  • Target

    9164-1278-0x0000000000750000-0x000000000078E000-memory.dmp

  • Size

    248KB

  • MD5

    4c809e6af84f91360bf41e86d681004a

  • SHA1

    c3ea1ca9f27b1cdc8bc71ac3a58135059bab89ac

  • SHA256

    95022b07782bb99ed7915eaa8e48c5ee48a527438c5cab280880bca4f1a1a975

  • SHA512

    ec24acddf98a32e509cffc770f5af6c80c2ad3bc047cb39c85b5853dfd32f8066167d457b763a5b8fd6a155f7ab42b942ecaa9590447e4da94e879e3737edc27

  • SSDEEP

    3072:oyng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzM:xg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 9164-1278-0x0000000000750000-0x000000000078E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections