General

  • Target

    2064-1343-0x0000000001010000-0x000000000104E000-memory.dmp

  • Size

    248KB

  • MD5

    83b047535fb924765d017924fbf024bd

  • SHA1

    edb0a04fe96a194317948fe842458a01387b3fb4

  • SHA256

    e17c8f0983b187956138d9277541474e46f418d414e10b370b81ac3d4d821fa8

  • SHA512

    a0631a1f937d564d9b7a5357ac5be323e1549f9b9b81e1738097f7601b66ab4db20136254c601ecf37467311ac1be9ba67f37a0cf77f733dfc304273db50efc0

  • SSDEEP

    3072:zVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOL4:JyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2064-1343-0x0000000001010000-0x000000000104E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections