General

  • Target

    2360-573-0x0000000000B60000-0x0000000000B9E000-memory.dmp

  • Size

    248KB

  • MD5

    02f69f965ca9765fb8149578a2f2b49e

  • SHA1

    ac6103582c8fd6f4c60c8030d4c6b1174987333d

  • SHA256

    801b5af22954d2ae7ed9ee5262a94ddc8cb45a78a52a934ae2c6aae447ad340c

  • SHA512

    6f90ac556a5f473b1980984a4c63e02222698ae878754eba17f3bfd144f6b75038d99b508bc843099c97e9cf7b6cdb2ba23b56143df0bfd06ac1a70494f9ad4e

  • SSDEEP

    3072:iVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOL8:SyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2360-573-0x0000000000B60000-0x0000000000B9E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections