General

  • Target

    332-77-0x0000000000090000-0x00000000000C0000-memory.dmp

  • Size

    192KB

  • MD5

    f0fc963120cf77f67719f20087fd35b4

  • SHA1

    631b9f58f88c612417a0d44c9ff1faefb1947f12

  • SHA256

    d884ba5c163f38091270969b7c14adf22991b1427893232f768eada1c74fcbdb

  • SHA512

    0690ad2adc1afe586bf1f69bb7327f1fbed2bb73af109e3498cd5a221111b82e64b1328627f07b15b8f3fcb6037ea68eabf2c9abe2567c0b25af421e9f6b8f3b

  • SSDEEP

    1536:0j2Q1qlVZRGWZc4rkqhW5CJrgnRQfTGqV+buc//yHGtjb83wYk08e8hi:CxCPNcRZqVKTKmtjbq8e8hi

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

red1

C2

79.137.202.0:81

Attributes
  • auth_value

    149c864a8f73ae7e8a9904bc94f60da1

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 332-77-0x0000000000090000-0x00000000000C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections