General

  • Target

    2148-509-0x0000000000D90000-0x0000000000DCE000-memory.dmp

  • Size

    248KB

  • MD5

    709dd1517b56335dfd62a64e7077f024

  • SHA1

    31852fc58f2acb71122bc770d348200ddead6dc6

  • SHA256

    55aebcec03073b29ce2593d9cc81df7bdd9747b044fdd7ad097398c8845612a4

  • SHA512

    0c2e33fc203b834f70e1a19c0480843d4a467d676de25d5d80c48544a7c138850212194f3d2bdf7103063253dba7ea6a16e6981a27646450bd6de97721a7dbf2

  • SSDEEP

    6144:LgrADDNgc6jYb9PXl3/f8FuAqSkiLWD+a+:srEDNgc6jM2LO+a+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tests2

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2148-509-0x0000000000D90000-0x0000000000DCE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections