General

  • Target

    1872-64-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    621f1c95e27b0ab4b1c190c2247396e8

  • SHA1

    418cc1d526b5f15d6bdaf783e19123e042ac6442

  • SHA256

    405782f08387722376274c34100aca7b0b5f75da76576814df6bd07f3e7c1281

  • SHA512

    d152d068d6111db3f1749188a8edb0bde2f982e4c446ea5280216357fa9577338ef5f05cc034174b6ce99906d13b1b370badb4ff75410f77b7f0e07ad2f41881

  • SSDEEP

    1536:f+BGlTP+mZP61IEYDmRSNigssC3PnG2P7VurgjpmIoyQC2buZysdEUM30wuei/RR:dV+m5c7QmRSNmDM8jpkjb0dlM3hCZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

CLOUDCOSMIC

C2

157.254.164.98:28449

Attributes
  • auth_value

    57e339f21389c74f44141a27fc762809

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1872-64-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections