General

  • Target

    1088-840-0x00000000012D0000-0x000000000130E000-memory.dmp

  • Size

    248KB

  • MD5

    68c24a8719d1cff1f720736bbd0c7a7f

  • SHA1

    15a597a9577fc17cbf3e76fbd08f976a57639490

  • SHA256

    ddd97129e1a7102b29e1ced6ea17545601f7fb53cbd60e1a8132d0ee946f3c54

  • SHA512

    9ed46b4c17880eb2dc30ec914b5cc1d43f3011a4af572a07d0078db4fe7def61db1ac15754bb24e923b58e25254dc5290d6f51e6ad897bfc51e6baaaa8cce7b6

  • SSDEEP

    3072:bVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLs:hyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1088-840-0x00000000012D0000-0x000000000130E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections