General

  • Target

    240-1135-0x0000000000A30000-0x0000000000A6E000-memory.dmp

  • Size

    248KB

  • MD5

    90b812e5559f61211115e95e214fd23e

  • SHA1

    edc017d9809c5674f06ea86e69e54c324544d071

  • SHA256

    9bcbda547f983798124809c15403e22f4f9a79ef7ef450cc9ef8acc98013dd6a

  • SHA512

    0dc23fc259de18a265666507deb7ece049f8c0c789d1c5ff5fd39142370c547dec0e53d42e5021497d03de55d947e6a5c0029083c35e1bc7b4f8db83f5024f55

  • SSDEEP

    3072:Tafto4niNgcr08sO6vvwQRfQPXCZ7eYtaHpKt/q1JlhHv5XGM83/+w1:OftTiNgcIXHnaBYt40/qlhHBWM83/+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

supera

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 240-1135-0x0000000000A30000-0x0000000000A6E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections