General

  • Target

    1940-3295-0x0000000000630000-0x0000000000684000-memory.dmp

  • Size

    336KB

  • MD5

    e7fdb04fc511fbe32757f6892685ccba

  • SHA1

    ef21815b78db45dbfd7d67aa13f65a0476917feb

  • SHA256

    0c3a44e8a7f3ccc237c96d018d6b8de144de555aea8745d621153dd13857e64c

  • SHA512

    fd1b60c5af36c557b2cfe2ce5ccdc5fe7065d3c9a68c878680f5d3a42ae059cc4e409d4ed33d7c9ddce0098c19463d9224f117322e873b090265d7f1d1c81645

  • SSDEEP

    3072:LfkCpXpfxIzbBePckWk6kVYmGmO+7GnTNSCmDILkBaWLkBWwnwb4dTvsu2qj4z+E:KyMBRRjvIxG+zMRqTjD4zL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ST12

C2

185.172.128.33:38294

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1940-3295-0x0000000000630000-0x0000000000684000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections