General

  • Target

    1332-79-0x0000000000400000-0x0000000000446000-memory.dmp

  • Size

    280KB

  • MD5

    157125819d650d6108d2551611901c7f

  • SHA1

    c114286c0fdc98a552d8bd4f6565449850f847b8

  • SHA256

    df8c51adacaad0d8ff261933e374e1625821a40242dbbca1eef283f9c0ab8882

  • SHA512

    b1636ef7cce38c4cab8f015d4eae977942f4c8c830cdcadb6698f847ef7c6e4e9cbec6e4ea2f3fbab7173c83699dfe499ff9b3507e255017aaa4a7e2e06e5d48

  • SSDEEP

    1536:9dLBmgrojz6evod3RYUOzdc7Mzhv8LsbV7/95PewyXa:XUsojgYxdc7MzhvtNb8q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

whitedoc

C2

81.161.229.143:45156

Attributes
  • auth_value

    2020d22aaa2ecafa1b12e00dfcffae03

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1332-79-0x0000000000400000-0x0000000000446000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections