General

  • Target

    1072-97-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    ed99e1702dd134e98d9f1bdc2f61a8c0

  • SHA1

    68411a5278cc83accbe29f807485922089e99d96

  • SHA256

    5d4156eb44cbad820f7874388acf7b51ee8a248921c8e17f6f40cdfb135e9e85

  • SHA512

    575b310653a7d1ccc8e4b00d710a794489eab18ed16c6a55320edc71eb84dc04c983596bb13e74be33e45aff0b3159f1f056de6b26d84ed8f050d77196a86086

  • SSDEEP

    3072:Tjl4PlApPoj9W4dBUTp+t4cxil6xNjirMdY1I5578e8ht:ThvoPil+U1I557

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

werta

C2

83.97.73.129:19061

Attributes
  • auth_value

    6e25ebacc579056d9e0c4bb3594012ad

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1072-97-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections