General

  • Target

    3032-1-0x00000000001B0000-0x00000000001EE000-memory.dmp

  • Size

    248KB

  • MD5

    e263def54a51dc9bac4dbb6f768cbc0f

  • SHA1

    65f56a120e07e00ce029cd7de6ce8d5616d0a95c

  • SHA256

    07d9df40fdea8a6097d77ba48c3d8fdd24efa8d11089063ecbc68e6109c34a3a

  • SHA512

    78d61fc57003062ae7438ea4ecf250e2b2ab3e1269921c4bc65a944d3d427176008c2d8146d6e0dcae99c085016a55c1d553435901852ea4af2ff14d68feb035

  • SSDEEP

    3072:ETuGoWl7qnENgct8GYU311pWevF0t/qWz7r0kbpCTDyLX:wuGJleENgcS1I1a2FS/Z7r0UMTDy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3032-1-0x00000000001B0000-0x00000000001EE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections