General

  • Target

    2260-1067-0x0000000001210000-0x000000000124E000-memory.dmp

  • Size

    248KB

  • MD5

    2ad55e09f6981f1debab2b529a05317c

  • SHA1

    f04cc898793f226332ad5fa551d71b779255529f

  • SHA256

    fd5ebc66e3c0598febc3876124bcd120932d12f27da113e999acdec14b584b31

  • SHA512

    0f19775ea28183c32a234ebeb3c2edb01e40a524739373a637461fc2cab969b2570933c6aa22992f6c6fce15e9be9716232855830a7aa552c7fc06fae220f17c

  • SSDEEP

    3072:TVyymrtnYNgctkfHrUkFTQmX1DJVt/qqfb2/fluHdOLY:pyymJYNgctwLU21/Rb2/fY9O

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

YT&TEAM CLOUD

C2

185.216.70.238:37515

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2260-1067-0x0000000001210000-0x000000000124E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections