General

  • Target

    2288-19-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    e38bb392058a7532bf8c29d1bcaddbd5

  • SHA1

    8c199e16b36db3b970cebdeebfba7528b0dcee4e

  • SHA256

    4acae1dfe4bcf6d8ec6a6f6629e30c64b43fa63cb8a0a329246dcc886aeb6e8b

  • SHA512

    c96d8776e1b1b1fc4f4d1bea28c9b31f11ef6b9822e8da165ef2382d97be3c9b35a5ecbda0e87d9a9b7156db97b2514caf272abe52c329677ad6e0c027566a72

  • SSDEEP

    3072:I2JLXfYoQk+nJLMbI7NKhYCef645Yd3KXOncm2xy9hPAgkVMRqT6Dv/YCeqiOL2z:tNbIyWL+3Kk2xy9xAXVMRqT6D4QL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

work28.7

C2

194.33.191.102:21751

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2288-19-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections