General

  • Target

    2000-323-0x0000000000060000-0x000000000009C000-memory.dmp

  • Size

    240KB

  • MD5

    bdc2f671003328fafd49c4d204c7b7bc

  • SHA1

    2cfadd69bdb29d929f006c0378989a8b9e148768

  • SHA256

    a8492a5ae344d67101e60328190890013dbc8f05f668aa4cc56c9c8a9f27233d

  • SHA512

    8d090c279efc9668d453b4366a2a2b65965a62d741625617682dc73af398c4b6e365a4df955526b41b6781735fe2c260dbc2075be93bc472a38d63ca4fbbdbde

  • SSDEEP

    6144:MZQSq7dNgcFKsrSJkkpj/Ux74c0d01SH0xWSwMPGO:MZQBNgcMsrIjgMcy0xWSwMPGO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2000-323-0x0000000000060000-0x000000000009C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections