General

  • Target

    1872-56-0x0000000000090000-0x00000000000BA000-memory.dmp

  • Size

    168KB

  • MD5

    10df3ec66e3424d108f329bce5d8ccaf

  • SHA1

    91ec83f440cd1f3b4287453eb1f054339086c1f8

  • SHA256

    ead2ce4bb41bf274d741102d224a7233f2dd57bc3db223ba7356a3a35e95ee5f

  • SHA512

    088b6a65ec37e24c361203ef97fa4e5d6a5d4298219af1ece05a2633506ab100f0d4f8b40c0d8d0a71dbc701fe54aede15f479e107711970fef99b97918b1a89

  • SSDEEP

    1536:/QRBGlTP+mZP61SEYDmRSR+g4sOFVGLE7+0/9wVo0QRYbuNCtC9RmyC0wuei/QvB:BV+m5c9QmRSR7x2ByOAyChhZi8e8hZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

TEX

C2

176.124.219.192:14487

Attributes
  • auth_value

    871ef4017f150ba2d537314d2610dc68

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1872-56-0x0000000000090000-0x00000000000BA000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections