General

  • Target

    332-292-0x0000000000F90000-0x0000000000FCE000-memory.dmp

  • Size

    248KB

  • MD5

    6df1988ed636a96e9de3337a08548bf8

  • SHA1

    1d7c7e798a0e19d4b3dc35e2de4e3eba23b7e2e8

  • SHA256

    8b259ebdc430137b5c8012bd79f16fe2c2ca2b7801302aa3909f4b727d99a87a

  • SHA512

    01c31daf94ab6d672893b3695607bdbcfd92d0623002717d32b11cfa968ba12b231816dae88cf235cededca025fd5998e04ca637d998514ec25f3ddc1837d12b

  • SSDEEP

    3072:ZVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLN:7yymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 332-292-0x0000000000F90000-0x0000000000FCE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections