General

  • Target

    2876-35-0x0000000000160000-0x000000000019C000-memory.dmp

  • Size

    240KB

  • MD5

    6704794fce75652720e24c269f40a771

  • SHA1

    4d685beeebd0df010c747446d68b68c1934a7dde

  • SHA256

    d44fafe086302d26bf036499a230008a307cd6d6c65bef56d18034be5d69e0e3

  • SHA512

    91b0b09adc945e9cf827e2bb83a59df1c165f0842fe29adca0223cae92c6220a036185d48108b42cf9a14b3940acd10e91e5545b74cfa3f988ac5343ab63ffd5

  • SSDEEP

    6144:AZQSq7dNgcFKsrSJkkpj/Ux74c0d01SH0xWSwMPGO:AZQBNgcMsrIjgMcy0xWSwMPGO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2876-35-0x0000000000160000-0x000000000019C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections