General

  • Target

    692-95-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    1deb2227e138f793348381aa5c25e73b

  • SHA1

    2fde29f3dc3677d3bef43a5bc5254cd8d0e8ee85

  • SHA256

    a52984c4b983fc7f61b0b6d7f670716daa877ce75abf55f5fb84bf5cfb1ab6da

  • SHA512

    790f238c70b5bac3f50843c303548ece8a083a010ee45cbab3e37a0d46884d7dd41acce5975b41a2a71ea527967d1f6375c5234e70b33624ed575ae957d0fc19

  • SSDEEP

    3072:CtaCObU4nXNgcBGkc53UID4N3wGt/qrhtCX7IWB4lAV8:CtatbTXNgcBRm3U/UtCXk04lA

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

homed

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 692-95-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections