General

  • Target

    768-87-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    48e8031f68f845adb1d321c08faa8137

  • SHA1

    d2d603dd13c68daa8686e073052a5dfbfa805699

  • SHA256

    8d51a4db55b03e53d980321569baea0f0dd725fff54a341476276bd5a4b5f2c6

  • SHA512

    597952098f9dcf2cecf936e7923fe3cf0fdd71ad14d3a44ff6e996ca11a57b7596f31196252bfa1794d1ece9394337ac468bf35e2bf141a668c117226ea87d9a

  • SSDEEP

    3072:Q7FcUMo+9XJIZYExNjGof40fz4M8e8hE:kFzoZLs3jz4M

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 768-87-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections