General

  • Target

    1052-757-0x00000000009C0000-0x00000000009FE000-memory.dmp

  • Size

    248KB

  • MD5

    2a0a01218d39a8daf994b9cf89f47f0b

  • SHA1

    8e79d7458b6eeb8d5df73ca301fbb805d07b9b75

  • SHA256

    ab826ffc9b27a0a7da6c655772c351deba72cbe8913523717f5f9d92e416dc1d

  • SHA512

    513a9a5d4cf5cd2f73426bd2edb57164992e5f7b3937c48bf02d8f7682318cc62e5f620b32c37adfc870cc2ae5971d8bf12f090909dbf15210986e2a1ea066d4

  • SSDEEP

    3072:VVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLu:fyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1052-757-0x00000000009C0000-0x00000000009FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections