General

  • Target

    1728-61-0x0000000000400000-0x0000000000440000-memory.dmp

  • Size

    256KB

  • MD5

    ae31d8ee66b2838858022fd47f18b91a

  • SHA1

    7c65ff022ed190d8ee5c1b1dccec173d176df120

  • SHA256

    7267811e47f9edf5d1389260544c01472862734fc695645d54929a3685080925

  • SHA512

    8dda99c11afdd5e273e430f5f255e0647d499b2bf225bfa056b025b7fa6010616427746a4f6877ef9eb6502f8b618319aacca83a84f1f3f71d9ba0bbce6a5c69

  • SSDEEP

    3072:3SGK7Hz8bWqVInANOxHIa1P//97tRTenE9VCYYss9pI+i6:3SF38aXxHIyRen6EYYss9pIT

Malware Config

Extracted

Family

redline

Botnet

TEST 21.04.2023

C2

88.218.171.68:20005

Attributes
  • auth_value

    a6b4c490205db18f22abb83df6a972f1

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1728-61-0x0000000000400000-0x0000000000440000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections