General

  • Target

    3956-1103-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    ae67ffa68183c5bc8d8ec8084de564ce

  • SHA1

    9dbec77208c25c64104d8278cda081204029302f

  • SHA256

    b3184fba6e44950eec3c5673d4c157342acdf8c4c3425ffe76ab840477f5edc4

  • SHA512

    a8f6344b07603f73b5d1a5eced47e2a37e0b373ff077a53cfbb0d857ed3cd1d5df050e560e1fec76117e59fbb25b6f55687010acfc62093fe735532fa1b318b5

  • SSDEEP

    3072:Nc4bRnjFJUZPkuMwfKUY0ATCjGx5VQJH3QxnCU1YLex2Bs/cadS2gMRqTjDv/YOM:6qCc5i8bxA2caAXMRqTjD4kL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

siski1

C2

168.119.242.255:23280

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3956-1103-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections