General

  • Target

    1464-829-0x0000000000B10000-0x0000000000B4E000-memory.dmp

  • Size

    248KB

  • MD5

    82641c1071ae057804e5b1721a6bfcbf

  • SHA1

    2827fe128746dce723d9799ee30e7afb97d85bb9

  • SHA256

    f6b236d86ccec324572cfc4fbbfed3de68347370ac5c678f05c28603fb9c377b

  • SHA512

    0ad9c2efcca9052fd843deda0d43222ca5a3fd7de135bf211dabb40aca138490d9248ff0a9d40b488733290bfe6c3eab3c9bea3ee0655fb468f8118e8983b925

  • SSDEEP

    6144:XgrADDNgc6jYb9PXl3/f8FuAqSkiLWD+a+:wrEDNgc6jM2LO+a+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tests2

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1464-829-0x0000000000B10000-0x0000000000B4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections