General

  • Target

    2784-866-0x00000000011A0000-0x00000000011DE000-memory.dmp

  • Size

    248KB

  • MD5

    e99fab6b1b6abae3f5bf70dce3c3b32f

  • SHA1

    231e0522f2304ed7f108df21ea26efa4bf07c8e9

  • SHA256

    d7c28a89eda6b5be4ee7b602e1bdfcf137bf4e40ab49b37be43d2d4a26a336d9

  • SHA512

    c7b5d40e12b60353d7c9e995b5e71e4178e59e45dfd45097339d5dc8e9454e4add06f88dea6acaf94331d9c29a548659973db56bb93bd4d6c475141b76629014

  • SSDEEP

    3072:DVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOL1:5yymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2784-866-0x00000000011A0000-0x00000000011DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections