General

  • Target

    4608-6-0x0000000000B00000-0x0000000000B52000-memory.dmp

  • Size

    328KB

  • MD5

    943033c3a7f1ddc16795befbd8273cd4

  • SHA1

    f9401a48eb6c27bab89b49c77ad74894c0e7b82b

  • SHA256

    0a4e248847be373da7f6d9a288f8728b0fc0317a1099e0762e0278f59db0b303

  • SHA512

    470dfbde37993a6b9b87a2a0c519620ed20570123fb16d16da5fe46114ba7453c6946a1ef94d671e63f0afc457b894b5aea49a2ebe808239aa64d1d11adc4266

  • SSDEEP

    3072:wcsqexnfF9k4fr+XwMK2sbAOIUdGHl8JH3QqY3nPrveWrNxk0QcadS2gMRqTjDv+:rdMdk2ktxkFcaAXMRqTjD4EL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ytlogsbot

C2

185.172.128.33:38294

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4608-6-0x0000000000B00000-0x0000000000B52000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections