General

  • Target

    1448-54-0x0000000000230000-0x0000000000260000-memory.dmp

  • Size

    192KB

  • MD5

    8efaa2e8e395fed44ff23b7d98010286

  • SHA1

    64568cce113c069e7eccfd63eaeeb99faed8fd74

  • SHA256

    2bb5a672d6724aed2c9de18ab8ef0198c2c47e30bed885bead91981624cc09f5

  • SHA512

    870a1b5c29fc07da88be6815407c6b172d01e64e8e7d4d6656360bd9d1f7f6a5d1cfad3eac3d24a4bff44a86ff5d724ffbbfcdea1479ca0abe4d4c23ec779e3e

  • SSDEEP

    3072:ajl4PlApPoj9W4dBUTp+t4cxil6xNjirMdY1I55V8e8ht:ahvoPil+U1I55V

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

werta

C2

83.97.73.129:19061

Attributes
  • auth_value

    6e25ebacc579056d9e0c4bb3594012ad

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1448-54-0x0000000000230000-0x0000000000260000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections