General

  • Target

    612-97-0x0000000000300000-0x0000000000330000-memory.dmp

  • Size

    192KB

  • MD5

    62d74825c40abc0708e7177367b3a2d7

  • SHA1

    b9fb398406901ca1bdda1ac79f652b39c853bc77

  • SHA256

    679d7def2fa541493997556a45c9c3f2b7e62af255d1469db15b7269b763cc05

  • SHA512

    bf1e695ecdf56ffab35ca78d5d4e0f4c4bccdc187689bf7e31c5f02b722712833783a96daf7e3627940b964985b9acc4c96d55fd67bc05eeba518760f7ab6eb4

  • SSDEEP

    1536:oN1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6VU:oN3KDlRy38i00xNKe/Jq7BoclY8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 612-97-0x0000000000300000-0x0000000000330000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections