General

  • Target

    1632-1-0x0000000000220000-0x000000000025E000-memory.dmp

  • Size

    248KB

  • MD5

    5d37a2d76c1c05376f4787b44a7568ae

  • SHA1

    21a7d573c45866986ffb1eda282a6dc14085050d

  • SHA256

    e3d1e8fc307e214d50b5c680afbce809cbeeb17c23a54103d6373d01a7887d3e

  • SHA512

    252946ad145edb48ca96aed213337644da8f27852d960fe9fe2008178d1c50cd0a2f6b08539ec916d49589ce551b37581a9e7197d44eaa10beebcb4321e080f6

  • SSDEEP

    3072:N+ng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzN:Kg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1632-1-0x0000000000220000-0x000000000025E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections