General

  • Target

    3916-827-0x00000000013A0000-0x00000000013D0000-memory.dmp

  • Size

    192KB

  • MD5

    5811b607b1c4e92dee953f1b6bc70f4a

  • SHA1

    80d68e693c706431e47ba9a955c10e5536409642

  • SHA256

    ab9260f17a6641409266e52cfacbb1a8edc02f0823b0b5d5a81dacf0740d5967

  • SHA512

    c6479c44f24643c22d13949dfbf14eb6c678e178b0c04a48037acc6c3710d4fbd74540d10025eddcc0b5f36321d1f43722ff94b07bce2c9898ee5c9a593d273b

  • SSDEEP

    1536:k2eCRqlVZRGWPiErMfxFUgo0GfwKnp0GTGqVybu3jKWODgh6yc4P83wYkz8e8hr:k2/4yfMBYDqVG0bOch6yc4PB8e8hr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5350206221

C2

195.20.17.139:80

Attributes
  • auth_value

    cf75908d75b4508135a38c8679c86f6e

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3916-827-0x00000000013A0000-0x00000000013D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections