General

  • Target

    1288-79-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    f85703c4ae730dc7d7f73e06a8038a57

  • SHA1

    adb0c180b514435efe481af1126426e29f36dbcf

  • SHA256

    01c27a78799aac4547ab4b44dfc40ab54324523cec194d51b4131d4186ebe9f5

  • SHA512

    06aec10039730d46cedbec5c4fbd094a13581e48be82a3600144e67d1be425bb599febb0fcc1949b4e96c0e216972e15feae589474599cfe0e99d31454973b10

  • SSDEEP

    1536:RaqXQzahmtnTT17KLeFq8sbLtuUI29+xn5MOZbV7cfaIPqkMJrF:cqXz0TdKUqPPth+xbBqiNkArF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

itd.atapack.top:40309

Attributes
  • auth_value

    a1bb9837c35f9e12335619d257888537

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1288-79-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections