General

  • Target

    1868-101-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    196e12d1e55b163e758ffc74568c6b34

  • SHA1

    1a4f72f1a93b2f8c91cd37ae331e49ef9a8136b4

  • SHA256

    e073d4327abb02428f2d299cbd8efb3e81ecd7dafc1d1723fc355f4ede43dfc5

  • SHA512

    14a983a84f5ef216940dbe3920b0520e009f36537328e560e0c04808992390b00f7c8f7d904b3a6f49370d589bd206a1973abfc1c672e39baf3588d2afc1ee02

  • SSDEEP

    1536:aOX0x98OG36sv0W7T6lgorHsDkIQy6HFnxNbAYQL5bub2XRSb0KM0GkRx8e8hC:0Zw4+kIIlnxNbQRw0KMW8e8hC

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

jason

C2

83.97.73.129:19071

Attributes
  • auth_value

    87d1dc01751f148e9bec02edc71c5d94

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1868-101-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections