General

  • Target

    708-107-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    8f95f5b0e4c9b4f5d3afbc84c79e1496

  • SHA1

    d1338c2d95ba2918af3e12b72fd00f78a00f4af4

  • SHA256

    ebe2e6822a2eb8c7352ed5f016e75135ca1cda913516654d02c4827f6b96c5aa

  • SHA512

    623774171627703d8387e8f68d28bde3f09b4de677a95178621a160dda7648744dca5b2aee34fb9c10ac05ac5962c21a5fdd6877abd2ada2f0c56340ff869c5f

  • SSDEEP

    3072:u7FcUMo+9XJIZYExNjGof40fz4k8e8hE:+FzoZLs3jz4k

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furga

C2

83.97.73.128:19071

Attributes
  • auth_value

    1b7af6db7a79a3475798fcf494818be7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 708-107-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections