General

  • Target

    4320-66-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    3cf6f417a8fa0e814d9eb4f25d8323d8

  • SHA1

    2c54c9cb8ecd3955d20ba6386c4ce8b04eb14d3d

  • SHA256

    5f9b53700d9e038c4ab0656b0163f83d15ce75837ebd0672ce95e58a17d5d2c8

  • SHA512

    dc1c310ae99d12e8d709e588c0a415d6c46ec1191061afe4f6c6fe90f76edab87971c0a7b096e76530d610457ad91da8be6ee6f19377907c1a71f770f0a07cec

  • SSDEEP

    3072:MeabIENx7INgcDw8ZJrTL4xeUW87ARSdZz1SbKeOCOKSa:M2Ix7INgcsgrTL4Sj0vz1SGbCR

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

plost

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4320-66-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections