General

  • Target

    4400-2529-0x00000000007B0000-0x00000000007EE000-memory.dmp

  • Size

    248KB

  • MD5

    9597f7ccbb2ec241114dfc4055dd2606

  • SHA1

    be943cd1b6b5640e322044dd3d7a47e4876ddeaa

  • SHA256

    5b4d758fa157cfd7c2679a1bf9768aff0fdc613ed1c8943dd5e5bfa7e7ed849d

  • SHA512

    7c11475f6948620ac2cfed30fe469353cea39385da5e0b88d34023348206cc64c5bdb444c8621f2fa1ac1385e6134e9f7cad7f0d2da94ee432772b1208d4e006

  • SSDEEP

    3072:ayng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtza:bg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4400-2529-0x00000000007B0000-0x00000000007EE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections