General

  • Target

    2828-1102-0x0000000000D80000-0x0000000000DBE000-memory.dmp

  • Size

    248KB

  • MD5

    f3aacd806e7fc920d63cb58751d96f5d

  • SHA1

    7b8b3ec7b4a2e6c1fecc79b3b5cc802b61526865

  • SHA256

    7ea4d721f7b3a2c87f294fcc81220b96c8703c09ad8edacb40a7d50fe61d0159

  • SHA512

    108c1e74bbb1c71309b1c0e8b4bf2ae8f3a7f467177e97f6e8c1ca9d38335417dac1b277a205672c5d5633c9421c785f9962b2687175ece144cf13996f59aa97

  • SSDEEP

    3072:eVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLS:2yymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2828-1102-0x0000000000D80000-0x0000000000DBE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections