General

  • Target

    2848-0-0x00000000003A0000-0x00000000003DC000-memory.dmp

  • Size

    240KB

  • MD5

    a06604028ff99db64a77e49a7640e598

  • SHA1

    995d06239281a7ccbab31fe6f204d1270067d4e1

  • SHA256

    567653ec996a8a67c7e449663c0a27f69e09ffae80de856f081336c56f16e86f

  • SHA512

    aff1b88cca70a4497323aa398a564cc06d784ffb5fbc566b7f975d8ebe867d1b3289bbbfdb7c7fc6b5ccf997d8d0b9f4cace5df332013193955f1f4796dda823

  • SSDEEP

    6144:T+BT7/7sNgcEmrFjKFq60Uc1SQ9iaQNE:MTcNgcEmr+89iaQNE

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@miromistin0

C2

45.15.156.167:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2848-0-0x00000000003A0000-0x00000000003DC000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections