General

  • Target

    5692-346-0x0000000000470000-0x00000000004AE000-memory.dmp

  • Size

    248KB

  • MD5

    381cc8f27d5a2d17ef0dbe9c53450576

  • SHA1

    70b69995d23d6d0bddabc92d020c84dd0d8185ee

  • SHA256

    16eecf493bed08a9627aa7446ac3469af6dbac5907499d5ca7a252f8814ce84d

  • SHA512

    7d080b088b9bca98985f0695ace56a9aa01aaf6fd87b87a4a2b6e4bd8cd41e5802044c81d3fb1d777bf731949266d4170e89fc4bc0676b5e356c85dbbcff2150

  • SSDEEP

    3072:NYng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzO:Eg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5692-346-0x0000000000470000-0x00000000004AE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections