General

  • Target

    8804-1440-0x00000000001C0000-0x00000000001FE000-memory.dmp

  • Size

    248KB

  • MD5

    7bf7f92f8e4461d55b37b842410deac8

  • SHA1

    e85f8fe0dc6f39c35bc51c8268c4e474016f5234

  • SHA256

    bc8bc7916d0da45186d572fdf416ac7ba7b2203e63ac9379d0f79ee7bae68a03

  • SHA512

    10e72700b145d6c61cadac537447e956d174ba0d3369fc0ffd0ee8ca326e2ff477f2dda811932740e06bd0f5ecfbae05fc997e832f7977230874f9596d387153

  • SSDEEP

    3072:NHng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzv:xg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8804-1440-0x00000000001C0000-0x00000000001FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections