General

  • Target

    2088-340-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    a5c8dd2146896407cd67fdfaf32ac372

  • SHA1

    3c8793544adc62fc4a06f8366afb4bedd47da60a

  • SHA256

    3c65a9986fc0d51ee14a84a6a9db7720fa38b3d910a8fc3bbd7a13eda2133234

  • SHA512

    5978c02bba0a4ea594a927ce7be684e7162cec4fd437f925c222d4e8eaf049ed66d35fc0ae7ccd0cf828e55e47589843e1bde2260d77b840b35c29228f656648

  • SSDEEP

    3072:r3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:reGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2088-340-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections