General

  • Target

    2032-942-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    b528108e54b9bee57bfac3996463a23c

  • SHA1

    9aa183e49ed8e793a199891e97718862937c3afe

  • SHA256

    7e1c130fde20a96ce67a76490caafcb7d93b3cd25020bde993b5bdf1e73290cc

  • SHA512

    2add6494ba0889ee93f63a28a102fbede92189f0cf64bb04e43b1bc27051291a51bd5c4939a939c508eb69d5676c6744d9542d7c6c492b87aafe03a705adce21

  • SSDEEP

    3072:P+kwz7rNgck/LeB2rmYGuDwJVgL0RSdxS1S+wF9YuKSr:2lz7rNgckDeUrm8Ec00bS1SzrYx

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5

C2

janaremrau.com:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2032-942-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections