General

  • Target

    2912-0-0x0000000001B80000-0x0000000001BBE000-memory.dmp

  • Size

    248KB

  • MD5

    d871fc67bafe550b4a2c6424ac822bcc

  • SHA1

    47fb4e2368b3ed9f25726693e366d8ea0deee132

  • SHA256

    94ed2b2e307494c1c35779114a3315fd9cfab8273bfb21b2b3f025bfae95896e

  • SHA512

    647b32f9321d7bb528a3bcbfdb397b497f4f4fe13d0743d3b4572baa223d4cdeea1fafaa15dc3150d56d6b567657c429adec6d695c105d673524825a669307ee

  • SSDEEP

    3072:TjsY7IhnKNgcgV/7oSlMfymk0o7ot/qqJfB9d3mxGAJGn:T4YshKNgc0zozfymk/u/ffB9dypJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2912-0-0x0000000001B80000-0x0000000001BBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections