General

  • Target

    7020-893-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    5fc1864e7528dee8e8fefc479414693f

  • SHA1

    e8c31f97f027a5c9939a14dd1774acd0674c15f3

  • SHA256

    653f8bfe4a2306d0df39d2bff6cd8ca836a8420ca113e6933c8accf562cc1e3d

  • SHA512

    0e007906222c0dcece004154ce64c3dce1de044230c1d3cc7b4e89da3fbc32c50865853e5456b32e00f1366ef035a627ae5a1f056cf4e676b0fc6667f81ce023

  • SSDEEP

    3072:Nyng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzr:Kg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 7020-893-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections