General

  • Target

    1484-118-0x0000000000450000-0x0000000000480000-memory.dmp

  • Size

    192KB

  • MD5

    24b5faf79bc7246d684dd25a99c511d9

  • SHA1

    0288aef03dd7508222670f6910edf11ae9082be5

  • SHA256

    252bb90a48a32bca282233bba968c8499d024fee0eb3a6f562ae85bf0b75da2c

  • SHA512

    a394ef3d0fbde518d5ea59a9d5137c52fa1c18c80ebc23aabacb41a8f1117a80f0c8b6f470d6e0d2a718f45d286932ee51b828e1ed2dba5bbb79c7264bc84f41

  • SSDEEP

    1536:ot1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6VT:ot3KDlRy38i00xNKe/Jq7Boclv8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1484-118-0x0000000000450000-0x0000000000480000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections