General

  • Target

    1012-83-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    13e89d800b308f08ff8b2d64ad730af1

  • SHA1

    85185081e010274b046aeb2e5b1524760ce2fe4e

  • SHA256

    2fbc2df2ab79b98608500cb7735eb1ec5bb45e27c26a7a86a597b584b7b0aaa8

  • SHA512

    8d21892c79efb57d195d61c3a6c6bbd584888aa4f2b1b1e5094432cfbd6e5848156b5b705b0f3f2577799a8dd0a59e78ce149fd99173e5949d47e006eda40778

  • SSDEEP

    3072:D47FCYO0NJQ5S0xNcIA7qVJeNGt8e8hy:Dvd0AEnCVJeNGt

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

drake

C2

83.97.73.131:19071

Attributes
  • auth_value

    74ce6ffe4025a2e4027fb727915e7d7c

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1012-83-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections