General

  • Target

    1716-56-0x0000000000090000-0x00000000000D4000-memory.dmp

  • Size

    272KB

  • MD5

    7d91d6dae4064208dcd68a983e96e0b4

  • SHA1

    a22a553f04c17ed99d40a89bf25e8ea6bb5942bb

  • SHA256

    74988b79a4d69d0d4f23832e4873044af35f70fec3a35a975f0bdd6050298f3d

  • SHA512

    31761da350df0ce2c92453566d1cbb4bd4c0480a672f65151d864c270e0cfba10542e3f1f17e8a32825cba445f9f90140b579127c23bf88f0180d1a9a2406562

  • SSDEEP

    1536:ra+vQzahwxMqFHKIEr5qFbLtuUI29+xn5MOZbV7cfa99pkMJrF:W+vzVMKV5UPth+xbBqi9kArF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5631065866_99

C2

dragrun.top:28786

Attributes
  • auth_value

    8e0a1c9a030cc4c326c224fdeb62adbc

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1716-56-0x0000000000090000-0x00000000000D4000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections