General

  • Target

    1668-181-0x00000000001C0000-0x00000000001FE000-memory.dmp

  • Size

    248KB

  • MD5

    dfae5c58afe6a55b0840516379c13086

  • SHA1

    d4d805f2c101c33c6d0a4405adcfdfc730b3d3b1

  • SHA256

    2046e6864f08ea601cfa6e6efaac7017b6d10bfe9f7bbe284c155dbfa86bb173

  • SHA512

    ae6dd4da1640704ff7905fe8421ae20ff5fb060f9eeb5fbf2bc44ffb2025fafc0757b1fcfb5b26aa26706f4b7ff30ce7bfd70729e5824599d8a0dc70ab739b69

  • SSDEEP

    3072:NUng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzv:Qg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1668-181-0x00000000001C0000-0x00000000001FE000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections