General

  • Target

    1808-61-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    c142b150bdb6720d1638001a199b8fbb

  • SHA1

    5e67ca381757e0d419dc93072b8dc19936fd8b79

  • SHA256

    305d45f9f7cad798538046e576462c818d27d21c084915ae8476e7730d15af59

  • SHA512

    7f56ce233a8d3f825ae7cd4974178ad24552930707deceec4cfd9318f50497e335e22d587b7d12eca11fdae3ca5c64d7282b6b5766e9e49e770e7b391b6fb338

  • SSDEEP

    1536:5uBGlTP+mZP61UEYDmRSdegcsET7Vnip/ZsyKBmCaxN/LotQjlbuzfyhWCX0wuef:nV+m5cnQmRSd2ipxQn+Nsqh8yMCXhVZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

BigBoss

C2

77.232.38.234:36987

Attributes
  • auth_value

    5a90da117ef9d7f91ea260ea7ef5a555

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1808-61-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections