General

  • Target

    6004-790-0x00000000005F0000-0x000000000062E000-memory.dmp

  • Size

    248KB

  • MD5

    54f59907fbfe56f9f7420569ad1c09f8

  • SHA1

    f82d577620acf5989a9d07d60947cefeecbd82cb

  • SHA256

    31d84db73982c10b1c0ed1578a4afbc1161de32a01e13c1818243c5290e1f850

  • SHA512

    6ebb9b27c0ff7b436699b7ff3ce63f7599997ab34625be265f345e4927f70df7b5fac5b8aa35063044b76e1ad92a946371cfce7234f1878fff2a3cc3ea22e162

  • SSDEEP

    3072:Nung4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzG:+g/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6004-790-0x00000000005F0000-0x000000000062E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections