General

  • Target

    1900-172-0x0000000000EB0000-0x0000000000EEC000-memory.dmp

  • Size

    240KB

  • MD5

    61a08b74b98caca20ff9b368a6033f59

  • SHA1

    1f459a5d93e32f5342edf8f50b261ecf1af53928

  • SHA256

    9307fd3694b547f721f8498f5b06eed0e9de79d4ebc7a96df10167a59f51a984

  • SHA512

    eb4aabd50a63d036695451d363060b1f010a819d1c827f23f68c60f1eba1c1a902a0a3cd9a71051d3fe463af67bfa415d2fb4c72b31fb247afea3c12e42562fb

  • SSDEEP

    6144:YZQSq7dNgcFKsrSJkkpj/Ux74c0d01SH0xWSwMPGO:YZQBNgcMsrIjgMcy0xWSwMPGO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1900-172-0x0000000000EB0000-0x0000000000EEC000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections