General

  • Target

    3696-137-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    b70d8b1b2f36df12681c21836e3fc25f

  • SHA1

    765b7d4a59d31d787627363578870233797131a5

  • SHA256

    35a6402182e21ab3da592343c77010b1c31cdcf528db9b4c14cbae9281ffcd37

  • SHA512

    bc91f2a5e19109d1e4681124592b2eb0ec9c2118d2f7904f62fefc18b3e9c41210f7b9e6c61c024676a38c211bb07095454bae820342a043f9b895049860a46a

  • SSDEEP

    3072:GctbRnjFJUZPkuMwfKUY0AeIUdGHl8JH3Qq4nuRHxTR0K3cadS2gMRqTjDv/YOev:Rbmk2/x1TcaAXMRqTjD4kL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

123123

C2

139.162.148.153:23433

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3696-137-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections