General

  • Target

    1608-141-0x00000000001E0000-0x0000000000210000-memory.dmp

  • Size

    192KB

  • MD5

    d1cd7fe1ca0ffd196b9e632fb8dc266b

  • SHA1

    37bce3c7996b75e00678f9138d9cb9e281e2cfa2

  • SHA256

    cbebe59b761df89505e14425e6165fbbdd6a0951143ca99ffef6be2eb1b71c25

  • SHA512

    8c5b76d672276d7bd2056f4c3a384788a700b664757c8151d0e5ce08f03e2c0590f32433c3fa68f670c55b626982efe2786e9106d317913e9ebe785436e66c03

  • SSDEEP

    1536:a0X0x98OG36sv0W7T6lgorHsDkIQy6HFnxNbAYQL5bub2XRSb0KM0GkR98e8hC:aZw4+kIIlnxNbQRw0KMi8e8hC

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

jason

C2

83.97.73.129:19071

Attributes
  • auth_value

    87d1dc01751f148e9bec02edc71c5d94

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1608-141-0x00000000001E0000-0x0000000000210000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections