General

  • Target

    1624-117-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    67fd750aafa312713513382a52c2e33f

  • SHA1

    e8a2e2288731aeea0235940eb412f9317a1552e1

  • SHA256

    795ed77183a1bcca3d63e46469650adc84497336920ae615dea45b3c1a8dd92f

  • SHA512

    d017d3070670544cab58fe9d8d239f1b31411770ba217f51dfa2c6ea6e17a6a697debeae9433e2d76554963b98bba2c4c59829356b33c245e3c57494b0b9da18

  • SSDEEP

    3072:xC9wrcA6NlreW9xN/m0v9hGd75054hL8e8h8:xCA6XCWxfGd75054hL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

hares

C2

83.97.73.128:19071

Attributes
  • auth_value

    62fed2fd42b168e956200885cefb36a7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1624-117-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections