General

  • Target

    4696-769-0x0000000000D00000-0x0000000000D3E000-memory.dmp

  • Size

    248KB

  • MD5

    9acb59728b694f23ddb783615c075c25

  • SHA1

    06f9b75a5a4e92d66dbe4a3723f794ece3179caa

  • SHA256

    99e47644221e5e49b97bbcccb32d20b19edeccb2fcb6fb2bf116bfe382d59eaa

  • SHA512

    9119a085cbc2c31b8da8d7d9ae0d4119ab19fe487f9044dd88860af2b8e33c7e5d3b1bf5bd0d82749aefad9fec616aa7a0b3d2c24b7d5041ff41e8808de3ca08

  • SSDEEP

    3072:9yng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtz7:ag/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4696-769-0x0000000000D00000-0x0000000000D3E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections