General

  • Target

    2020-1-0x00000000003B0000-0x00000000003CE000-memory.dmp

  • Size

    120KB

  • MD5

    541350dd9bdc799b18c54f12892801e6

  • SHA1

    f43af5b0dfbb97adad0f11a653a037ad60b9bb57

  • SHA256

    d7865a0c49794be0b564d29ed0ea17a546afb6c0d76b750083b4b381c307c974

  • SHA512

    058f4ae2e2ecd23b77f300884bd8ea8d54099d9987704dc0bc2cc49f4233c030dd5880ae25cb41a3ba8cbbc7eb37ccc46afb6ff9171a9ffb2458d51b8c7b2a5d

  • SSDEEP

    3072:lvAEjhPm4tmrEDUdzFkDSuOkZDcXiqEqVN9:lWnKDRAXJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

971558280_99

C2

https://pastebin.com/raw/8baCJyMF

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-1-0x00000000003B0000-0x00000000003CE000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections