General

  • Target

    1640-101-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    971772f9b4d8443cd08bbfe1faf5181c

  • SHA1

    ea0d455a5711c5ed197040f173827109ce4d56b6

  • SHA256

    9989f6f773f6f3d8e8cc2b02fd3391ec1adf12eceb1bd686e99a8d9959ca0ad9

  • SHA512

    8e577d48d02515c67316d8a0048cad1b0f92e24f89898e7b232975e008402996c23cec80dec7e6f42243b37f20a63ddd183a019c53e5931e4ccb3e19c2592dfd

  • SSDEEP

    1536:aYX0x98OG36sv0W7T6lgorHsDkIQy6HFnxNbAYQL5bub2XRSb0KM0GkRU8e8hC:2Zw4+kIIlnxNbQRw0KMX8e8hC

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

jason

C2

83.97.73.129:19071

Attributes
  • auth_value

    87d1dc01751f148e9bec02edc71c5d94

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1640-101-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections