General

  • Target

    4648-2026-0x0000000000180000-0x00000000001BE000-memory.dmp

  • Size

    248KB

  • MD5

    03738b85e33243d986b9f5d9c2714c2e

  • SHA1

    71d9e3c30f6c83cc05af99462fe7e8c6c7220ef5

  • SHA256

    d48d9a9a29df103cd2d893b3ba2d58c060d1fae1206879a7ca38a8784aca2abe

  • SHA512

    eb2ddf541e2aa6e8307420506b5ac69d0e8fa47c4a019892c9d6ba374dad5520947fad3c3d3385db8b4d2e14a7ca8da0dd38080941d09a5216a4b7bd351bd670

  • SSDEEP

    3072:lyng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzD:yg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4648-2026-0x0000000000180000-0x00000000001BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections