General

  • Target

    616-155-0x00000000048E0000-0x0000000004924000-memory.dmp

  • Size

    272KB

  • MD5

    2bba17ef6f26ff0fc1064ff593e381b6

  • SHA1

    82cb9f044aafc3838fe0addb142ee7207dcc184f

  • SHA256

    4a5ba8f6c74b591de56268ad42b319f983482c3357cb9f2617e99ac9585e6f52

  • SHA512

    9c5440be9aa6403edbd10b6abfe647ffcd22c20e66ecd6dd7afc188ef8700641908b288814eff91c66afe10f384063e5eeac4a9e1046a67307ea504e6c234bea

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKL:96j+GosvqFwtLo0yr3QhZnI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 616-155-0x00000000048E0000-0x0000000004924000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections