General

  • Target

    320-87-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    d6cebfb5fea514403ca00e82ed91a31c

  • SHA1

    8e22f327304baa0097b2952d2ca3d53d693c14d6

  • SHA256

    7538e6ed9288191cafb893c172aeb4d21ea911f9c8d63bd712fa084dbaf2d691

  • SHA512

    8d584d78815dc5d53d1e81dd8f69d8c91754eeb7cace48bada7c99fababf4041be77b3a1db1be0d992ada21b70cf601de96f51e29c95eb0a657d9a9a447d9058

  • SSDEEP

    3072:j7FcUMo+9XJIZYExNjGof40fz4G8e8hE:/FzoZLs3jz4G

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 320-87-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections