General

  • Target

    2104-1276-0x00000000010F0000-0x000000000112E000-memory.dmp

  • Size

    248KB

  • MD5

    7bd1c8d700fadbfbfb5157d1d9977c68

  • SHA1

    09a32c1b5444572fe0f4aaa9bd6b637df630765d

  • SHA256

    5952107a6f4fb5a7e878a592ac58c7baf364d012152a2f38e198b1abc81c3379

  • SHA512

    5af7ea88ad4ab677c525e77bdad70cf078fa5a5c405397ae0c43e92e61c83dc5fa749bf612fb25ad4c31f15b2f7d23bde5b3ec0d2990d25cec605453dfbd936a

  • SSDEEP

    3072:9VyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOL6:XyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2104-1276-0x00000000010F0000-0x000000000112E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections