General

  • Target

    2016-32-0x0000000000020000-0x000000000003E000-memory.dmp

  • Size

    120KB

  • MD5

    27607011683fbba528bb66c6d2b95f61

  • SHA1

    de2f9bbaaeb7b7907cd578fea7a498373120a274

  • SHA256

    10035d3d311c3246e4d81c9924de5fc77327f85ae4aecdff44939b3db4a370bd

  • SHA512

    c0aa70a79d77c4ccddac6902edc4524dcf3a1e000c72223af7e36a35fb9a74a9d801dbdedf038a42e92ef9b9035de5d2f46002326397778a0e053ffe198d27d4

  • SSDEEP

    3072:EvAEjhPm4tmrEDUdzFkDSuOkZDcXiqEqVLS:EWnKDRAX/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

6077866846

C2

https://pastebin.com/raw/NgsUAPya

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2016-32-0x0000000000020000-0x000000000003E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections