General

  • Target

    2128-381-0x00000000008F0000-0x000000000092E000-memory.dmp

  • Size

    248KB

  • MD5

    675bbd29f78a6aadb8fa3dad2b4c90b3

  • SHA1

    45d5c1fac58912bc470cdc08b2204ad672a60fa4

  • SHA256

    6e80a921bbe1a5e898a3e812cea9b642950586e4a9212922a837d8f4fb63c186

  • SHA512

    dd42fbf53b977d2ad88d7b6391e6fd38d4c1bd598e12bd0ba18c6094f0de1f1fe729517b8bf6e0fc948c73c87999c9c124eeb941febc68dc0dfe5fc69b42e4f8

  • SSDEEP

    3072:JVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLf:LyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2128-381-0x00000000008F0000-0x000000000092E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections