General

  • Target

    636-699-0x0000000001210000-0x000000000124E000-memory.dmp

  • Size

    248KB

  • MD5

    7a6fde1a0ff3f5deee5c489e947b0d3c

  • SHA1

    90a677c93d886b2d118d9ab1acd59adea2392941

  • SHA256

    9f4101d40e9106f7ad04027d9fd7bbe0477475c5af08f795462e20b6f60c597d

  • SHA512

    4c8963ff4e4157898db9a266974f41329793a86f3b0ae77770da9d518b506f208bc1aa02c49a3f5bfde7d998f5b4928c269037a6413da00f500ad0f252db766f

  • SSDEEP

    6144:sgrADDNgc6jYb9PXl3/f8FuAqSkiLWD+a+:7rEDNgc6jM2LO+a+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tests2

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 636-699-0x0000000001210000-0x000000000124E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections