General

  • Target

    816-1152-0x0000000000CD0000-0x0000000000D0E000-memory.dmp

  • Size

    248KB

  • MD5

    d5ea6a0c96a4c33075ddca1a15362c1a

  • SHA1

    24174474df9df273ae1fad787a894ea66e11a002

  • SHA256

    8e866dbaacdc88bc8edb14eb12ec57e495952995d60de07c5b62df95307355ea

  • SHA512

    d50c668dc17d294837e17274a1acdb8e375de4dd06ebfcbbd3dd8124fdb0ae35b248b5fffc021a2b744bc38e0b7ef205c34e40b2d1410610dc3ff2bf242281ee

  • SSDEEP

    3072:5afto4niNgcr08sO6vvwQRfQPXCZ7eYtaHpKt/q1JlhHv5XGM83/+wH:4ftTiNgcIXHnaBYt40/qlhHBWM83/+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

supera

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 816-1152-0x0000000000CD0000-0x0000000000D0E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections