General

  • Target

    596-112-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    670c519583a2f0dc0b006f88087ecb48

  • SHA1

    35ed7a4bf0176b80c51c8279d7761d87633f1d83

  • SHA256

    ed17ec059e516af092e2600d26d77d93feac5b763c85c65e8c2acd39253ec096

  • SHA512

    8ba63e5ca142ef8d61421e367708f608b9ee2addabfa57b1b5676b11f392de164cdb69aced6b4735d51b4a7e208813648addc77e886a9c63c9dd5f54ecf7b9b8

  • SSDEEP

    3072:dgk82FZ24nvNgcVcSDzL7GPl5t/q3IT6v+OC2lEm6:dgk82FVvNgcVxDaN7/RT6v3blEm

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

wolfa

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 596-112-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections