General

  • Target

    5208-975-0x00000000001C0000-0x00000000001FE000-memory.dmp

  • Size

    248KB

  • MD5

    f38c72a36e29b17de2328fa2e95b95e8

  • SHA1

    93de04f4e040d6c5a4d9c32e94c4c9aab7d1b5b0

  • SHA256

    44f9fc9131a2ee9a4a2853fbe2a5fda986521176e2dc1c825a1be322a5bac847

  • SHA512

    8e490ee4f8896cef3483c1835e18dd8b7e66c6f4a99e69cc265e7b1c7879ba6b3147f744ce80088f67fa71fb42e8f39e268d74e5f4d344feb820425e6032a7dd

  • SSDEEP

    3072:NZng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzv:bg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5208-975-0x00000000001C0000-0x00000000001FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections