General

  • Target

    3068-83-0x0000000000300000-0x0000000000330000-memory.dmp

  • Size

    192KB

  • MD5

    9796dded160a7fab94018c077b5c4e83

  • SHA1

    bcc9390d2b4fb5b1f88519e50c316f1b0094d577

  • SHA256

    58a3cdfdf3027c0cfa8794ce9d7d0fbab807ceb9416c85f860fb49b98a29dee2

  • SHA512

    4ad309615ce39680a5e2e0cc14793740336f3be112324700877b50cf06b55f6d72c294373511cb9df2b90043ef662cf7c2c41a0478d917199c2be01560b27ca3

  • SSDEEP

    3072:8N9zgaHeuGhriktrBxN3kuZ+zdzl8e8hj:a9Ie4rhTodzl

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-83-0x0000000000300000-0x0000000000330000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections