General

  • Target

    844-322-0x0000000000C80000-0x0000000000CBE000-memory.dmp

  • Size

    248KB

  • MD5

    bff614f13ecfcfec8c1e4db1f6ed7b0b

  • SHA1

    64aa02360a4536ba15a4876b99955442b0049388

  • SHA256

    8319ec81e3895b3020308d9648aa8f364bd3a8e683bdeb08a4053d6ab0120322

  • SHA512

    e429baa45d2eacce14ea1c2cdf567b332a34ea2c6af22dac8356953828cd2b8bff86466c12741bfc94f9dcf74a56bf1e8775ac1b34a8fb0250bbf30c44ad60c9

  • SSDEEP

    6144:xgrADDNgc6jYb9PXl3/f8FuAqSkiLWD+a+:WrEDNgc6jM2LO+a+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tests2

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 844-322-0x0000000000C80000-0x0000000000CBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections