General

  • Target

    8072-656-0x00000000001C0000-0x00000000001FE000-memory.dmp

  • Size

    248KB

  • MD5

    3805de86fc4480515aa925e1807e2320

  • SHA1

    eea055ae2d9caee132a69d908f6a7a2504cbc01d

  • SHA256

    67a6feba5bb1fa3730d3263de4a640271ff573d1e4b2d308598996f47439430b

  • SHA512

    54d536fec3f2bac52d587f1f264df4dc4ce23c4798efa44e49595b802fabbbecf0d9dff66c4922c37d38cc706377d7722b747b86f4eea8e2b1fbde34eb046fb5

  • SSDEEP

    3072:Nrng4InXNgcy9Wy3aPGcntCTt/qhGFlvDYLXZiTtzv:lg/XNgcWr3aPu/5FlvDYLpqt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 8072-656-0x00000000001C0000-0x00000000001FE000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections