General

  • Target

    2064-335-0x0000000000DF0000-0x0000000000E2E000-memory.dmp

  • Size

    248KB

  • MD5

    da5c32762cd850af6409975090d1d630

  • SHA1

    05f62d526de8d9f43887ad7e4970f16d026a97c4

  • SHA256

    948fb46732ba9b33e8b953c27cffa927d9981c79c2a2aa8f9cc60653d16d9289

  • SHA512

    610a0ba897383df7a8468e38bb20c18bbd259a8708d83f17177ba0ec374dd576fd69a67f125b153a421f808eff5c80e8928560a21a2144818c3f7544cc85ff34

  • SSDEEP

    6144:PgrADDNgc6jYb9PXl3/f8FuAqSkiLWD+a+:YrEDNgc6jM2LO+a+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

tests2

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2064-335-0x0000000000DF0000-0x0000000000E2E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections