General

  • Target

    1428-143-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    b1d7275a6f39fae8026e3e7743edabdd

  • SHA1

    e7c408df4a44d39e6524cdc0192298681a1a8e45

  • SHA256

    dbb95ddc6bb7d8c75d1868531349a3a27f5aaa9616c6cd244f8029bc502da2c0

  • SHA512

    c5b9de4b9bcc57acd8dd7ed025fc36dba4c46d96b8c0c6a5681d5aafc25eced6adca7b73a1508ba35acbadfb4c27d773e3b3536d123777a6a5ccd8c5163e4a14

  • SSDEEP

    3072:2itDiwyqSVghBGfAGtTjxNKifvWPxnr8e8hy:VibuhM5ZmnPxnr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1428-143-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections