General

  • Target

    1944-1120-0x00000000013E0000-0x000000000141E000-memory.dmp

  • Size

    248KB

  • MD5

    ab5f641e91045ed437bfe5eab2a4a28e

  • SHA1

    ca31fb0ddc629f34d58291ba6607e86404f65129

  • SHA256

    9dea2a1491768b10f58fdb6e2c8ab462a45464b53f25b4217c9c8effa4b178e1

  • SHA512

    5a085cdf243ceb5623385e2606678bc65c5c413934dae6ba1f1648d4d29f5e484bb7800861d5656320a15bef49449d9d974d1f7c09acbec5d144bfa74e3c4acc

  • SSDEEP

    3072:DtaCObU4nXNgcBGkc53UID4N3wGt/qrhtCX7IWB4lAVb:DtatbTXNgcBRm3U/UtCXk04lA

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

homed

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1944-1120-0x00000000013E0000-0x000000000141E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections