General

  • Target

    2164-7-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    29d729e1c57e550f1e7946e43a9a762b

  • SHA1

    de5c3aaa7ecb8e13d0fc0f75d8bd293962fc5a5c

  • SHA256

    b1891d582c00efc41106589d509517e653fd35c79afa4c7953c3f01e05b76add

  • SHA512

    d4e3c4af10bf7fb059026c5e88f3e17cecae8b8159adbe5dd9ba740db4c71cef13c5175845bfc1d8e9ac67f572c224ec47067e00235c0da4b138fb3c60966fd0

  • SSDEEP

    6144:bmQmz7FNgcpbrWlPR6Q06dNSmu6Mh+2p6:bmQUNgcpbrDQFu6Mh+2p6

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

horda

C2

194.49.94.152:19053

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2164-7-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections