General

  • Target

    2312-1011-0x0000000000D80000-0x0000000000DBE000-memory.dmp

  • Size

    248KB

  • MD5

    30af7d7670dbacc9e6faeabe34b35a73

  • SHA1

    29a27e3ec7db75b7e7b7bd1832e11934fc01d624

  • SHA256

    6f1d0158070e6926e63148eebef2b626be49bdd86f4afc84077aba2069789b27

  • SHA512

    c7b939cbb35a536ff138038b94e52aa2bddfba7023273e163ffbdd932d16a0650090f2343f6b2809736f3374734ecab09ee1c43af33bd9d9eddb5b3fa399703f

  • SSDEEP

    3072:yVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLS:CyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2312-1011-0x0000000000D80000-0x0000000000DBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections