General

  • Target

    1772-336-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    9a84e8e57b86c80db50b61592946b5aa

  • SHA1

    26a08f0d3d2f35e597bfe2eb9ed7872454c37efd

  • SHA256

    e19a31b70e91378f0337b81900a39477f7611f0f9fd2a81744f44757ad5bfa6d

  • SHA512

    f3e9c45e462364154b88739dc0d9b92025007c6bf6e6e69705a607be02ddd3eece7d8e6ef707ca5dc8c0d807554cee0cdd5810f75928dbb5b9983e0f662d0427

  • SSDEEP

    3072:H3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVRI:HeGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1772-336-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections