General

  • Target

    1296-313-0x0000000001050000-0x000000000108C000-memory.dmp

  • Size

    240KB

  • MD5

    1547dcc6908ce81b4e4d4b8f06b60f66

  • SHA1

    9ed5dcefee963a984b2df6b79f7204adf6e08412

  • SHA256

    aa6e873d38e03fb8f4d878362909c93eb8ff78dcfe11222c0276ff2d779dfc7e

  • SHA512

    a7c6686ae4a1af81c1eaa691a0edaf01435f4fc96dea7049f22ba28cc9d25dfc9b970dfe8412771069c4a7802abe5c580944b6489ba45fd9a4003af8ee7e2b16

  • SSDEEP

    6144:IZQSq7dNgcFKsrSJkkpj/Ux74c0d01SH0xWSwMPGO:IZQBNgcMsrIjgMcy0xWSwMPGO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@oleh_ps

C2

176.123.7.190:32927

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1296-313-0x0000000001050000-0x000000000108C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections