General

  • Target

    2124-0-0x0000000000450000-0x000000000048E000-memory.dmp

  • Size

    248KB

  • MD5

    7d13058d80014f7e0871ab14d18a41bf

  • SHA1

    86b92d02b3c2ac4d0614e7c6b57eb48ed9cee701

  • SHA256

    b767768adf8e64520f66fc93bdc6567fb86af5c3967f31a0ebbc9dc619d59965

  • SHA512

    265b7a8742b4c019ea7d44aa9c29abcecb8e824d87cb9d6b040ae4e545ddd98a12c167314d1ceea2b9ed5c806a81ae10fcfef23d863bf2e1c6480f742a49e1c6

  • SSDEEP

    3072:TTuGoWl7qnENgct8GYU311pWevF0t/qWz7r0kbpCTDyLV:fuGJleENgcS1I1a2FS/Z7r0UMTDy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2124-0-0x0000000000450000-0x000000000048E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections