General

  • Target

    764-142-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    c592a7acacdf8819d7f0b290d5e078be

  • SHA1

    b8329ffae34d224b1f45b03491b009e30951ea06

  • SHA256

    464379db9a7e23de91a49ffed126a245674c3261e93851a8f89b2bec06b1336b

  • SHA512

    693a8ba7c4dce6a5366f828045e199bc14880a800f14d448aa955b6c96fc129e35f05e4c10f9810ba4f23538d36d2906ca1b04f55b5f920d01964f3628bdf951

  • SSDEEP

    1536:ow1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6V7:ow3KDlRy38i00xNKe/Jq7Bocl38e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 764-142-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections