General

  • Target

    2608-1-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    d946cd5a5e64243b51424084cd9b41e1

  • SHA1

    4c0074c94bc0380c289ccd4bb0af6411dde5c93e

  • SHA256

    e86b5a92d0ee540268c337557d8e6c732f9feb4f03a2a3baf803c70d854b653e

  • SHA512

    454cb7f9c52a5e77b997a5436a77700b1b16caa70aeee5d7ea0b464f91cccf70c12a209f3a59c7e3ee2d602c098e80697b5d70ee40a1102d054f878805162747

  • SSDEEP

    3072:vvAEjhPm4tmrEDUdzFkDSuOkZDcXiqEqVpS:vWnKDRAXV

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6699398393

C2

https://pastebin.com/raw/NgsUAPya

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2608-1-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections