General

  • Target

    1976-162-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    cac8440c1e84cf3ceef33c82d164048c

  • SHA1

    694ba512a5ccb51b436cf3f738f58e9bef7a063f

  • SHA256

    b635f884394f44cfd4fb23286e8490a6a952d29a6d8d06a2fa18a5008b8d4cfd

  • SHA512

    aa58d66efaf9065e1b59884e5dae2b39cd6d06a353ccb7a701e5f07f7b530b70846398d84d167613f3bb45a0d7a1c5a71677aa38225fcf4338082f81cb10879b

  • SSDEEP

    3072:r3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:reGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1976-162-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections