General

  • Target

    2160-2-0x0000000000400000-0x000000000041E000-memory.dmp

  • Size

    120KB

  • MD5

    b0a60960a4a5a374d85d45a24ab3dbe5

  • SHA1

    be8419e82270e54323b7126de1c32a3e4d0e42e3

  • SHA256

    ba6cdbb9df5cc36cf7e111c728f3687658942bda75e0bc8730b2fa8719852213

  • SHA512

    4be10c14f9d9ed894ce3b5294b5c7c5c511b79ce02fa08843eb0602be8c03ee783b254259bd39bcd07c8119bece86b507c905337310e7f569e49b430ae951cdf

  • SSDEEP

    3072:9vAEjhPm4tmrEDUdzFkDSuOkZDcXiqEqVh:9WnKDRAXt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

2131228623

C2

https://pastebin.com/raw/NgsUAPya

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2160-2-0x0000000000400000-0x000000000041E000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections