General

  • Target

    2012-54-0x00000000001B0000-0x00000000001E0000-memory.dmp

  • Size

    192KB

  • MD5

    ecb2153bb3540543602ecd4ec44963d0

  • SHA1

    c8badc5187408db13a2cf96d83b3b311c07c90fc

  • SHA256

    e7d420603d6fd62c4302b3e460711db9789ad1ffae7792ba96d908c5de858e30

  • SHA512

    b67ac7c73c95cb3a25df75a4c3aab2a848657a56a71e31fe6f0fd5ba453d1894dcee3196623a8e4d361ee16953c5cad3f79a18d9832960a53936551ecb6a17f1

  • SSDEEP

    3072:d7FcUMo+9XJIZYExNjGof40fz4+8e8hE:VFzoZLs3jz4+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-54-0x00000000001B0000-0x00000000001E0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections