General

  • Target

    924-97-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    85aa438bf8ed94d06a2baf4f79a2c89d

  • SHA1

    9631c0179fd214ccd1f8c30044be617b4a284249

  • SHA256

    36fca72d02cfc9317108e6d887dbf552fa08f0956123e2a81f3b71508c62feda

  • SHA512

    da841f750cae59cedea1e6fc811fd59e7e48f9d52c6924c670dbdd8dd7e7c7f612b32fe02d4204155d169035df8eb22bd015deb4344ece4658f2e422164e9ef8

  • SSDEEP

    1536:oB1dH8Hd36sv0W7T6QJ3rH3yk0I8pDUm46Z92kwk4XNBjkuv23Wfr1zaRXDxv6V8:oB3KDlRy38i00xNKe/Jq7BoclA8e8hy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 924-97-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections