General

  • Target

    1960-118-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    54a17a6b8622038148d6e8a10cdcdad7

  • SHA1

    45d999e74c3e6f47dd1346fd4e8878160e8813d4

  • SHA256

    1a21adfcfaf329cd902258203fc905c9e6ce1d976bafcdc02253c7c9b05f71bd

  • SHA512

    fa14d3c9c9745e03b7b298063b88444e0e5bf4ce693b9b77c0038bb8ab2bc1638628000c51fe3745800abd14626989065a110c2929f7c3fc98ce2b94ad2746be

  • SSDEEP

    1536:oH1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6V8:oH3KDlRy38i00xNKe/Jq7BoclA8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1960-118-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections