General

  • Target

    948-659-0x0000000001180000-0x00000000011BE000-memory.dmp

  • Size

    248KB

  • MD5

    a652fc701da1ecde2f1dfcc1e267a58e

  • SHA1

    b551c9c9a63e562df8785119332b1a350f1c73c4

  • SHA256

    1bc2ebcdf8b4d6c5914da68cf5e1c9281cf84993c7bac5ef0a8b03809a14d280

  • SHA512

    3ea0a6f8119741beb90fb820f3737fcf884205fdeecb460aac49dfe509072e1af929d89ddc8da52833bd65e1944a200842a14fb3ace5aacac9652e2e7a8d3bcc

  • SSDEEP

    6144:YgrADDNgc6jYb9PXl3/f8FuAqSkiLWD+a+:PrEDNgc6jM2LO+a+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tests2

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 948-659-0x0000000001180000-0x00000000011BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections