General

  • Target

    1460-1343-0x0000000000A10000-0x0000000000A4E000-memory.dmp

  • Size

    248KB

  • MD5

    edced2c1bffc511671957203cfda7e48

  • SHA1

    65f7e4ad065bead6376de8d6dbd3547b0858d47a

  • SHA256

    ec5b43d2ad310f402fac7d23f7fd484490cd8fbbc6eedd2597fbb252c5bc9ab0

  • SHA512

    50c60763f4e3b74676e87302fafba9b26c569a4712e049d8aa2a42837c5750fddff3b424d6055a88577d4d0057e6ce51d031fff4705682e55a7391b5a5568d1f

  • SSDEEP

    3072:aVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLV:ayymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1460-1343-0x0000000000A10000-0x0000000000A4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections