General

  • Target

    1984-36-0x0000000000080000-0x00000000000BE000-memory.dmp

  • Size

    248KB

  • MD5

    d0b7cf433a3c38c200e5e27bda15bde9

  • SHA1

    5adf672dbde8b9bbf03d010b8f08e81fa319cd14

  • SHA256

    0aa5f9fc77ddead7f5861ab59f5fae8ef65564b5b9a80bb9b2692d7bc3a41c99

  • SHA512

    760d35ed0f41b8de43d50d775d50ef641c4fa1d5ddba7bb218bdeb510ee5deffaeb3f094430a195c86516370799b91ab50ba0463dcc73b7734fd02cf962b3d47

  • SSDEEP

    3072:LOgTfvnjNgcyr46crL+W6sAt/qSpHet6oVAs8xMLFh:LOgT3jNgcyrlcryW6j/HHet6sAHxM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

work

C2

135.181.11.41:38051

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1984-36-0x0000000000080000-0x00000000000BE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections