General

  • Target

    2196-1229-0x0000000000960000-0x000000000099E000-memory.dmp

  • Size

    248KB

  • MD5

    a4095e5a64dbf42d5d07d4f5314dc5bb

  • SHA1

    dfc36364207a1c7463d18d23429be50242d25154

  • SHA256

    b3eefb16a3a1a6cb7889b5eae9f2fe8eed872b719d39fc52a9a87f0c760cb0fd

  • SHA512

    df90aedd8f197ae3dd580c01ec32f61bc9d14b9d3b81bd386a3c181ca5085fba3c3f56e77b189bd8ccc8d31c748ad5a52fb8f0aab45457babe5d982fe2be3c7e

  • SSDEEP

    3072:OVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLc:GyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2196-1229-0x0000000000960000-0x000000000099E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections