General

  • Target

    3068-239-0x00000000003A0000-0x00000000003DE000-memory.dmp

  • Size

    248KB

  • MD5

    36adf8b858e44fb202579f3a1c6c4497

  • SHA1

    a82146653ad291e7adecc7eab2f77de427d76e38

  • SHA256

    694362c76393609fa5f9b0c137c59c65d4547f16ffb566f7a894fac4752db0c2

  • SHA512

    58f247550f9c55a168a1483234b134e62158e0384c41691229f7d6e04ef2e54179c407d42e22106dd74a65fe7c2cfee212f2dfb49683970e6f808ff329f19ef7

  • SSDEEP

    3072:qEjJpWunbNgcc+fw1nRKlnwT84Zhct/qR8NbtS6Gbmhmadi:qGTWubNgcc+I1nRKlwTQ/PNbtS7Khma

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-239-0x00000000003A0000-0x00000000003DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections