General

  • Target

    2748-4-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    230e407f7fec772d02c0ab325e9943be

  • SHA1

    d070740157c5c7e24c72bb1371b0f1adf0c48ae9

  • SHA256

    b833f26bb138995bca5cfc18d4aa360a707b2c5f6f242d16a6938325e8436656

  • SHA512

    3d7c7a8f526f7350ee7e8ad63e7807ac716f341d6da3487a3952fd418e090fe4e203fc43bb417219fdad9a4fba09268ee36f5a4e9d9b24243d527d962591fb78

  • SSDEEP

    6144:lmf74u7kNgcMhrM4HoAANGd0kT1SzKk2jZ:k7cNgcMhrS9gKKk2jZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

new1

C2

193.233.132.4:1285

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2748-4-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections