General

  • Target

    3020-329-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    66801d4d9be04b2d333b204cb9d12137

  • SHA1

    0ce5e09bd2e6bf7bdb3892e2599d418902808be9

  • SHA256

    35a638665971b46f92cec6cb948debe25d170671770d3c38d36fa0e1b7f9d027

  • SHA512

    bf5c127cc603a99ef6a1891eb3065f9c8807b0b232a1097bf178a39b0309073188afc5c72a8ef2a02154643875f3493454f98d22487ce6e9eaff4b09d84c89d9

  • SSDEEP

    3072:RcyqhnyFgELfJUkwAKQmrAOYE2ViJH3Q9dznO5NxzHs4cadS2gMRqTjDv/Yneqi5:uO5E1fx7tcaAXMRqTjD4pL

Malware Config

Extracted

Family

redline

Botnet

@RLREBORN Cloud TG: @FATHEROFCARDERS)

C2

141.95.211.148:46011

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3020-329-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections