General

  • Target

    1744-101-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    ebd0054d3319fe5643ca412449b0b344

  • SHA1

    5c3b07a088623e420e4fc2b54b89e0fd9ecc4047

  • SHA256

    9651cf5db48c4bb681721b2dfd5f3b17d378f6dd5064fe9482ca275cbafe9873

  • SHA512

    9166471e565d7a9c9a58eda94fe7f8e39dd6978d099d5b4e0ea3fc924413c2a6277c825712e1dd5dddf065f4b5d7e6391538b274a4c77b9e33864062ee802867

  • SSDEEP

    3072:b7FcUMo+9XJIZYExNjGof40fz478e8hE:HFzoZLs3jz47

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1744-101-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections