General

  • Target

    276-588-0x00000000003C0000-0x00000000003FE000-memory.dmp

  • Size

    248KB

  • MD5

    173c9ff736976cac7dbff5e6c8070fec

  • SHA1

    1d5bebc3d44769b5b1975ce42dae7215debd909d

  • SHA256

    e9dc6b6dce4e181761eee2495e9c2075d0bcb620c6d4ab5dc2b58c0c48890106

  • SHA512

    5565c9cb2cef1bf54371eed175c9397f94ac0273ffb67b3d3b8fcba5bb323c14444d955e060e26a3055ba37f0e873a0fa478520a081bb181147fa61dca9381d9

  • SSDEEP

    3072:Nbng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzP:Vg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 276-588-0x00000000003C0000-0x00000000003FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections