General

  • Target

    3404-1156-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    1a984fe8c9405a1ea54bd248588f6cf1

  • SHA1

    c7c4c13fc503681a73e163ec2573be80f52cd059

  • SHA256

    a3220c1c41917078c81a5f52a1e8ba3dbd1ff608bfba93ab4d56c9142a9223a1

  • SHA512

    79cdf36913abf6cac7885ea8c38d69b36e9d77d6f37cd4abb04450fd341d91ae988a09b24f4ef1e5a78213cccec4af3a284a7d64a9583ef6f974edee557dda69

  • SSDEEP

    3072:A2nLRLYCQPxfSLEb9LQNll2S8rdNdAXtnaPnxah5AgkVMRqT6Dv/YCeqiOL2bBOW:V+bV+2PBjA4xaHAXVMRqT6D4QL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

777

C2

195.20.16.103:20440

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3404-1156-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections