General

  • Target

    916-54-0x0000000000230000-0x0000000000260000-memory.dmp

  • Size

    192KB

  • MD5

    5a7dd5c1ad0a32b6ed60a59c6d25566c

  • SHA1

    8c05596fb76206639e79ecffc0722ce9fd9d77aa

  • SHA256

    bebef258e51527f1a8c9fbdf8ebced3fbd2a6bf01f9f6c50e8d81f0b6f51c89d

  • SHA512

    08bc4609a2ef64f5506e5aad8f4414ab16fbb62602f0526d7909b461feb6cec0ae0a81ea6a9525666559f7eea55920f67fd77786e005e70d3541c4a3b91d5c6f

  • SSDEEP

    3072:Ojl4PlApPoj9W4dBUTp+t4cxil6xNjirMdY1I55V8e8ht:OhvoPil+U1I55V

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

werta

C2

83.97.73.129:19061

Attributes
  • auth_value

    6e25ebacc579056d9e0c4bb3594012ad

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 916-54-0x0000000000230000-0x0000000000260000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections