General

  • Target

    1700-1066-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    de5a467b9941019c151491a866c1f8ee

  • SHA1

    a474d28605e2d27973f057fcaec92d1bb4c0cf51

  • SHA256

    bc5bcec4063a09236effed7152d4f619739e85581229b059c5de1f0d1fcdea7e

  • SHA512

    fdfcca33ba1e07226735cfe214fbabef3bf53c299033f39d5fd5cdfdbfa48bd561640586b4f92992fb8a0620b08835c2199b2a626313de1ef48b440139da42a5

  • SSDEEP

    3072:g3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:geGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1700-1066-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections