General

  • Target

    768-442-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    0b63ebd972a6608e5c19ea4c0406ea3b

  • SHA1

    76b907396e8341fc8f5ee37ebeccfc31a2ea2bf3

  • SHA256

    f4c245ba490326e20e3649b26cd37f57caa8b8a42ec51c59a02b5a9cb506c244

  • SHA512

    bba72d33b67fb872414192861a6e9c63d5f9f61f403839c1c4c8c876384dae1aba704e7bb3b43312993cec02e1660fb6673309e77a46571bc8ac07b074b99ea1

  • SSDEEP

    3072:A3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:AeGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 768-442-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections