General

  • Target

    1728-0-0x00000000002D0000-0x000000000030E000-memory.dmp

  • Size

    248KB

  • MD5

    4a914e8021919b692365aa6337b1460f

  • SHA1

    b5ccd84b17c6213705c9c5acd9baeded636a92bb

  • SHA256

    42e4d2a580220863a389843104cd46814ba3795aaea3e014546e9d9d5527436a

  • SHA512

    e59f25c9e903a3312ae0293e798285491707a50df72c3946ed5c03edccc3f06efd05ad546c9783d34a897cd0d21d661b1204ce715d2c71cd428a66c3a93afd16

  • SSDEEP

    3072:cTuGoWl7qnENgct8GYU311pWevF0t/qWz7r0kbpCTDyLt:ouGJleENgcS1I1a2FS/Z7r0UMTDy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

194.169.175.235:42691

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1728-0-0x00000000002D0000-0x000000000030E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections