General

  • Target

    1720-363-0x0000000000160000-0x000000000019E000-memory.dmp

  • Size

    248KB

  • MD5

    267c3379f773885aa1886b4e3736f622

  • SHA1

    78ac158d15a9365e3dbb6f3496f3eb229c308ce6

  • SHA256

    1f8afef7038f3380952fc14de0966ac5dee3b6e37c2e610c73314b7e3804c705

  • SHA512

    8e3e7679c9a046c7a659f72bae95217bfb4deeeb61ffbe823fc15782ded3217039a790377d6d50856fecd3977799ba1baa158df2822977c22b75c0fd46bdf880

  • SSDEEP

    6144:mgrADDNgc6jYb9PXl3/f8FuAqSkiLWD+a+:hrEDNgc6jM2LO+a+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tests2

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1720-363-0x0000000000160000-0x000000000019E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections