General

  • Target

    2732-738-0x0000000000F80000-0x0000000000FBE000-memory.dmp

  • Size

    248KB

  • MD5

    47020483c3e4a99b786988bf6e2194ca

  • SHA1

    66729e650d929ef3d0e79ed5dbf818ea15aa4edf

  • SHA256

    abb4bb4273e419b8c37ae953d06043194c8b0e11ad1b93934f2ccbe22bfbebb3

  • SHA512

    f9a5e989beb39149cbf672d41c4572e481ba3ea8648a2b79de1be69f133de6c2a65a14fc9181b3f07711fbcfb0877655a581fc63080cc0bd92b4603428410e7b

  • SSDEEP

    3072:SVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLy:iyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2732-738-0x0000000000F80000-0x0000000000FBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections