General

  • Target

    932-150-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    ad622eeaac4b8c5680a76f590d26a7de

  • SHA1

    ab0557b825fd73a117e52f830917d2cca0676ddb

  • SHA256

    45b0a3b8765b6f19562031effc73b1b88fefb7058e153b7feab211667ea68217

  • SHA512

    0e2bc582aa7bea4ce445a5315f38859fc5e93f89cf9187d57991f2199d72449831e6a83996f7e7c5d15cc3d958c355fbe138aa55936d1cb9b4bd347919ec1ff1

  • SSDEEP

    3072:g3HcjBPe7NerE+CrFkDSuOkZDcXiqEqVR6:geGKDRAX1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5141679758_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 932-150-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections