General

  • Target

    1748-293-0x0000000000D30000-0x0000000000D6E000-memory.dmp

  • Size

    248KB

  • MD5

    8cbf72089bc149613ec9b6e3d40f0a30

  • SHA1

    9f07270b68c2869281b091d8defbd4e0ba4e7f9f

  • SHA256

    7ea2efdeb03d9e575e8759a1b763bf4be32de0ce9b2711181615aa22e63768cf

  • SHA512

    2fe69cc68acd53a9c2bb266de8449aa1204592bcc005dc68361517cfd50644b784b4f491f25998e0d96fbe00e1d3e7b78a7f678e2f39a191b7843f60c410b8e9

  • SSDEEP

    3072:kVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLL:wyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1748-293-0x0000000000D30000-0x0000000000D6E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections