General

  • Target

    540-1031-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    24525bd4c535bb5412106f8cd874f488

  • SHA1

    c5124199e4e88267f3ed6c484a17e2a4a6646e0b

  • SHA256

    ce0a6702f8e043b639246cafcff27ef6b8269a5f93f88ed4f98e20b718f6d055

  • SHA512

    debcb8d481db7be2b7eeb365dd1ad957834a0856114a7ae4e54086c55faeb6bd3215b245e133c218254350fc5b6f5e5f73a22eed5239e6d3bede0abc1b42aca7

  • SSDEEP

    3072:b3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:beGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 540-1031-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections