General

  • Target

    1484-174-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    656c15c2cd861680366f7c1d91364c50

  • SHA1

    b69c996baa82af3fe4364254c43adc59dc1ee78a

  • SHA256

    eec1300d97403582e8c0759dd9cd5f81347bcff366c7181f8b1cc089df2ec345

  • SHA512

    1929777e07806902d55d7dbee17a70443ca8b60768b46c178c7b17d13dd04a269b14bbffe95b0c477a9ac83b529ac6d9742bef6666e28d84954054697909e4a7

  • SSDEEP

    3072:vV+m5cVQmRSxDBKsZGmbIe4z4hvZh8e8h4:vj44sIJO4hvL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

sister

C2

185.161.248.25:4132

Attributes
  • auth_value

    61021810f83e6d5e6ff303aaac03c0e1

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1484-174-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections