General

  • Target

    1716-90-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    41240d90ad3530365e34ba037bf63d91

  • SHA1

    5d29e0e30f95fcfd9ecf55438fa0a157373e2e91

  • SHA256

    d1254065b5ec014fb09e2d774dcca9649e29bcd07737e25d283d4e3a54603f8a

  • SHA512

    fc812e0c36dc167f0f3c162eaf4495a3eca50a751e4963dacdd563060398cc579cd6957a2d96992533acfafc6e07b949ed22596447209bbaf10860c30bca03c3

  • SSDEEP

    3072:1afto4niNgcr08sO6vvwQRfQPXCZ7eYtaHpKt/q1JlhHv5XGM83/+w4:MftTiNgcIXHnaBYt40/qlhHBWM83/+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

supera

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1716-90-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections