General

  • Target

    3660-371-0x00000000001C0000-0x00000000001DE000-memory.dmp

  • Size

    120KB

  • MD5

    7096932e83317c2e064a9e6b1c42ef52

  • SHA1

    759131ddf82691db354d88972bc95c7b695c7729

  • SHA256

    4b7ed645c0401439be46b61bae2f5f7f79bf2f1a1ecf56eb367a004fab54bbba

  • SHA512

    ecf6a5c76d864656b3e0ce764447f10c3646aa4fa6ccccfa05fbe53c4c08f4a998389219100c1f73c3a47aaaa83a14aaa92e657c3a167390ad8fceb1a83d49c3

  • SSDEEP

    3072:43HcjBPe7NerE+CrFkDSuOkZDcXiqEqVRI:4eGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3660-371-0x00000000001C0000-0x00000000001DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections