General

  • Target

    1092-101-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    cc926602672bac00600af78fc548113a

  • SHA1

    ff950d86e13ee8e405c428c73fac7abbb79b6d0c

  • SHA256

    616ce1881c2d824aaa85d37c3ad0523dbe5a06d11dad9c86a35e4d42941d40eb

  • SHA512

    1390723651ab6c2a0a446b3d7690d75c30ebdaffe83d3d51598ca817b8d1fc2cafcd672aefe61b210121805b2942c501eb10a0ccd83c1ff4e4d5f2daf719d205

  • SSDEEP

    3072:l7FcUMo+9XJIZYExNjGof40fz4k8e8hE:NFzoZLs3jz4k

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1092-101-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections