General

  • Target

    1724-618-0x0000000000390000-0x00000000003CE000-memory.dmp

  • Size

    248KB

  • MD5

    17e088d7311731a34bee58a38b0178e9

  • SHA1

    b117216de4da2e9c305e168d091cea400f9ed499

  • SHA256

    9461dff5f3bf0721dceb747eceda5dda11899ad3decc8052f984d3830bf91649

  • SHA512

    0cbc1d4a04335af6ff0c82c354a2d30586e9378b83ee97820b60429998b2a7553dc260f777cf8445636b4bed7e20e761e7c06e2f26786b53ad818d23b9657c3d

  • SSDEEP

    3072:pVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLN:ryymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1724-618-0x0000000000390000-0x00000000003CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections