General

  • Target

    1864-270-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    0c807b753c82b503413a1620dc386686

  • SHA1

    9a13cdb76d5edcfe383ca1245b34faa98fc4a2bc

  • SHA256

    bf76b52c61e841b00190aad0df8f7504130d629c1445e61be18b63ff30713c2d

  • SHA512

    958a2d075a379e51754d99d03018cf34796c68444c7d3352112f470543c7fef4de80702be2699982f477089e8c6a03209f8a2aa6b58c60b711c77cf989eb6d3b

  • SSDEEP

    3072:di0IDvSs8p2hxNHeMqnm4XaSK0ghr8e8hD:kJ91QLXaSK0ghr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

droid

C2

83.97.73.129:19068

Attributes
  • auth_value

    4e534d26d67e90669e9843dbbfac4c52

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1864-270-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections