General

  • Target

    1744-0-0x0000000000150000-0x00000000001A0000-memory.dmp

  • Size

    320KB

  • MD5

    0344b5a2d206889d1d36cbe0e6c0d80e

  • SHA1

    b2581b348baaeeb311dfc05eb4ba17a3459a49c0

  • SHA256

    67cfba3aa2c91d5e6d449319a7803503d113329f6493bc326aea30c49b5c3050

  • SHA512

    12fc46dedbc08140c08e2905b4ac9703ca6db36547f604c6211442371acfda8ae475a0c26b3ae63492da0f0f2b3f6485fe528e25446c84025420bafbf1152238

  • SSDEEP

    3072:NCq8+MBKumR+yNTfxMvgYnPjBwerczZoP1z/cZqf7D34NeqiOLCbBOA:NRhMBKumfQF7BpAzZ+dcZqf7DI3L

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@magic_dad

C2

147.45.47.100:24854

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1744-0-0x0000000000150000-0x00000000001A0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections