General

  • Target

    540-1270-0x00000000001C0000-0x00000000001FE000-memory.dmp

  • Size

    248KB

  • MD5

    0d4a353acbb59e6082092ee255ec3f76

  • SHA1

    8c06644a47a41cfb7e9a6a0cec420cf59175bf05

  • SHA256

    de3fa7a56e273ba904443e790ff87f7c10e74aef7048308d72fd10c374aa2b90

  • SHA512

    0ff3a2cc74cc9dfbf5c3607e7cb8ead7d87edc931fae5792f682d7f5a56b9f1f620102048c16d49d4e3c5c896bf172ee5018f35a4f0018a720295e6482a991d6

  • SSDEEP

    3072:Nnng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzv:dg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 540-1270-0x00000000001C0000-0x00000000001FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections