General

  • Target

    4936-243-0x0000000007780000-0x00000000077BE000-memory.dmp

  • Size

    248KB

  • MD5

    3c2fd5ad8de8782cd56b0a6aaa062cc5

  • SHA1

    d1cb1580500181dd323de0fb3249e1535b27e408

  • SHA256

    97bbbc674ce7bf87d86444dda214068db72ab8003bf84ab357cf3c8cb7af2786

  • SHA512

    78c6fb6739ef2e7af6ca9d4857b8f5f8a07a1df5d150e7a737d8c7026bd2cd3401e3ee1ca911a12763f565fb3be2d9636b10b8efd96779071cfb60299ad2366b

  • SSDEEP

    3072:Tj6jAEL16l5lCF5gkhFgSqQM+wFhWmik6o400SamXhfVnuky6+mOxNn2pU9f2MKV:Tj6jCNQgoM+w/WmSYXhtnukn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

01

C2

167.235.133.96:43849

Attributes
  • auth_value

    a158e35a6caac69f2614dc12bb02fdf2

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4936-243-0x0000000007780000-0x00000000077BE000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections