General

  • Target

    4304-264-0x0000000000620000-0x0000000000650000-memory.dmp

  • Size

    192KB

  • MD5

    3151de420adc953bb9a35a3b46d72177

  • SHA1

    c3bd96c33045ea555e658a3d30e0a2de3151c9ef

  • SHA256

    753ba029eabbc5b602709efe066dae3ef4090b5fb02d4d4893f07a6f2167e450

  • SHA512

    2ce4dd357ef9a460bf1254e25e291b2f6207ead80f356356de6449ddad8d19c6daef5127415395358207398cf78d9d26e9aa0f95b8ad37648123d4bc9e47b34e

  • SSDEEP

    3072:wN9zgaHeuGhriktrBxN3kuZ+zdzv8e8hj:e9Ie4rhTodzv

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4304-264-0x0000000000620000-0x0000000000650000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections