General

  • Target

    1596-155-0x00000000005E0000-0x0000000000624000-memory.dmp

  • Size

    272KB

  • MD5

    00504266dca55d7b076f6690f913b42a

  • SHA1

    e8554653ca1312a04312676d060826be3bc7a050

  • SHA256

    ee40265327cb848ce03c4e50afe145d8f64e305d441f9278f3869ca5da1d44f9

  • SHA512

    18565e503f57b89baf9b672fb1cad656bb477379217ffbc0d521420068a25f5304feee82f58050f911ac4df165b8c4e3bab5b1a9a28a6201ea60d7d16f9b05a0

  • SSDEEP

    3072:96jYELp6VFxCCWosai9QFwNsmLo0gacrilo40OTkQhOEnISw+dvoxNn2pU9f2MKW:96j+GosvqFwtLo0yr3QhZnI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1596-155-0x00000000005E0000-0x0000000000624000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections