General

  • Target

    2336-328-0x0000000000300000-0x000000000033E000-memory.dmp

  • Size

    248KB

  • MD5

    8b09f8ac627c2d23a77ad8b36cefdd67

  • SHA1

    69541957df959ae31722791f62337eb2ca1964e9

  • SHA256

    fbd40e535d6178ce6d1539fb956edee76258e5b65343c6bba27e50db97d4f6fc

  • SHA512

    778ebe40364061de5b017baf5b44155e793393945462d5abb6359853efc373d31e9c8e247ead0bef80bd84c62a93bfd44463683f073c6f6651772daf8e439005

  • SSDEEP

    3072:1VyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLq:/yymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2336-328-0x0000000000300000-0x000000000033E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections