General

  • Target

    2044-55-0x0000000000090000-0x00000000000B6000-memory.dmp

  • Size

    152KB

  • MD5

    a04bfa1ca6c4a0afbdc5ee44b8c22509

  • SHA1

    9d55d3334e5c78874f3acb6f220147fd3335cafd

  • SHA256

    904e09f7280cc4f2c9307d0e3f957ed1c554863c5a67c418a4c988686a37fc15

  • SHA512

    afb15ab099bff48570a681563f3b4b6076182de8a17bf1138bbf4bac2bf8aa690baa06ffcc5d2bb391bda787715967bbc0a04c91630461bd3b68bd17d86d8366

  • SSDEEP

    1536:8akcnVHT1C/oHxsJQ4+fe0koAXlIrMhcjxRbV7U/odaZsYgibfbFDKsRK:ZkcZZVoq20ktiIW5GgbYgafJlK

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@ididjsjsid

C2

185.106.93.193:48563

Attributes
  • auth_value

    315b63f16f20bf5e70e2036b34a8f261

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2044-55-0x0000000000090000-0x00000000000B6000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections