General

  • Target

    368-108-0x0000000000360000-0x00000000003B2000-memory.dmp

  • Size

    328KB

  • MD5

    ddd694ee6eb270754dd85d41f166f731

  • SHA1

    952e0c0fedcdee05663fcae792a72bd496bb1fa2

  • SHA256

    5c9455274e0d7055f5fdc8752ca230fb444526345a6fc44b326dedb7da798c1f

  • SHA512

    9de46a8e9ec1c236a30665659185fec04d6061d48f79f8f5822f9cdba096fdcd09999fd08ec464f1ac07b9c14b8b1db98cf7e2bdb957c2978a456b211a9b8ee1

  • SSDEEP

    3072:529LP/YAQlW30GLsmAwNr12pGuhTMo1syKXFWnO3TRGfx01h7AykPMRqT6Dv/YY5:Q2dmA42gST981BcxKBA9PMRqT6D42L

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

2024

C2

195.20.16.103:20440

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 368-108-0x0000000000360000-0x00000000003B2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections