General

  • Target

    576-97-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    29117e5e017a7f00e808aed52746a6c8

  • SHA1

    6ca87a2fbb4ddd0b4b889f5cffbfa653bcb48b2d

  • SHA256

    49d597f20224e6d406974fd054b29d8fa238fa24424e1eb6bd94bed6455bd586

  • SHA512

    0432b053175a7d324333f28b769c7d7053f96be9471ae9fe097ea7212fd52e1099f35d6e00de5fb28d10b4e8a8a9020fcdccd87bfb368cd9140e562ae8476511

  • SSDEEP

    1536:oG1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6V8:oG3KDlRy38i00xNKe/Jq7BoclA8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 576-97-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections