General

  • Target

    1756-54-0x00000000002D0000-0x0000000000300000-memory.dmp

  • Size

    192KB

  • MD5

    4f80009393038244c80cab793407098d

  • SHA1

    a123b20544bbda118a41f776b6232b4ec6605c29

  • SHA256

    b684d74114b3cd9b82b423e8cc8871379946e3fc910bbd72107a0207d0cdefd8

  • SHA512

    6ef2af295e0ff837cd1f5c9e3adec55a99c77fbbf4a6d1d00b29b083f8d035c6c93ee4dbb9e5c4feaf2bf1e5393acbd6fc26d325983faa43bb283ed60fdb3035

  • SSDEEP

    1536:ogKedNi036sv0W7TWKygyvHWlLRsBChShr1xNQlYQ/nbux+vlYroYl0GkRH8e8h4:oAIGPVd2CKr1xNHOVvWroYl08e8h4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1006

C2

176.123.9.142:14845

Attributes
  • auth_value

    b5da80860b093905c2bba6f9377af704

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1756-54-0x00000000002D0000-0x0000000000300000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections