General

  • Target

    2772-1006-0x0000000000EA0000-0x0000000000EDE000-memory.dmp

  • Size

    248KB

  • MD5

    0c8f2beef76815449e0af48a9f03dcb6

  • SHA1

    4b9d84e37ba51bdcb19e9bb4857a296f437435a4

  • SHA256

    977214977d3063d6e63b9698171625d5247ded4221b7cc3605215b5b347e3415

  • SHA512

    541b77231645a0a670fcb649a035b4a554039859a2994c1b41788979dbc5df42bd1bc8d8be7376968f81746349367ef6663c34f3988123b143d506f839da1b2b

  • SSDEEP

    3072:OVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLo:GyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2772-1006-0x0000000000EA0000-0x0000000000EDE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections