General

  • Target

    1220-809-0x00000000009E0000-0x0000000000A1E000-memory.dmp

  • Size

    248KB

  • MD5

    fb23d2bf7fb443296b15eb9c24f4c990

  • SHA1

    240bcb9c86149c4513045c0a1e2f46549de0b7aa

  • SHA256

    68ecdeb0d8187e1cb3e089f717252cef62d0e7e35608ad99f1df592ccb16dbc7

  • SHA512

    8005b998fe4d7aa2d736ef118042d9f9b3bb3345fea5027e51937cc2815f74da42cea90f0d775ab6e43ba67fd2e422c69607f0c57fb8ff004bcbd2a7dfc05c3c

  • SSDEEP

    3072:GVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLE:OyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1220-809-0x00000000009E0000-0x0000000000A1E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections