General

  • Target

    3024-249-0x00000000008A0000-0x00000000008DE000-memory.dmp

  • Size

    248KB

  • MD5

    4d8a6cdc3986f35f17331b4dc4010a53

  • SHA1

    ea2b0f8dc372dc6ea4e4c74f4da929ec5dde90ab

  • SHA256

    bf44f2f5d9d530d550faabef6824699b2fd5bc4ae102be0bafdb199c7f19df57

  • SHA512

    b1f02eb3699264a0cfdfac609a6e8f05bc16cb18ceb9b8f5894cb6306ca5372e46e19b8599ab024080500127d3f6964da3863c1cdca0f9fc83e0ad6b990e4752

  • SSDEEP

    3072:JVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLI:LyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3024-249-0x00000000008A0000-0x00000000008DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections