General

  • Target

    1540-130-0x0000000001030000-0x000000000151E000-memory.dmp

  • Size

    4.9MB

  • MD5

    b222c720ce284a931d8c76e5356db0a0

  • SHA1

    e329da7e2bad4cddd995c83ffe778a4c679453fd

  • SHA256

    c768053fd72b7731454802d1719a517332a733e0380fe76ac03f886970afe030

  • SHA512

    3db60a72c1343caa12f43dfd2484667e51f2cba636d1e494d4ac26c4bc02fadfbd8bec23752561648478147474ffeae5f1e104863a2dee2f13b837e7e67892c3

  • SSDEEP

    49152:rBpMiir2aHMhBzGteON4ogGsrV/LZIJVh9Q82rurzlVa69p8:1pMdrBshBz1Ey/FIJVh9Q8oczN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

buld1

C2

77.246.105.2:36110

Attributes
  • auth_value

    62bc3e67da1c22be709461c20461eaf4

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1540-130-0x0000000001030000-0x000000000151E000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections