General

  • Target

    4072-136-0x0000000000400000-0x0000000000446000-memory.dmp

  • Size

    280KB

  • MD5

    982f48159e371eff065351aabef5f2c1

  • SHA1

    61f88d44f66af90d2336d13a487f46a669d9e414

  • SHA256

    c9a452f86a135e883d4ce3f92801a4208321cced419f85e5eeade4c888e903f2

  • SHA512

    a7add433c4433fb9c0c1dce3206bdc92af684535bca3d75393b0ea94d62923f91937d00a673ba308c8c1b38dbcad02b446603f5e6822c512a399836e225b89af

  • SSDEEP

    3072:NiizLdKn7psXp0uA08Hy/5/Z8tm6/3EjkArY:NiizLdYsXp0aNCskA

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

GUARD

C2

212.113.116.143:29996

Attributes
  • auth_value

    27baa1530ae9189fd41c2d951828e794

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4072-136-0x0000000000400000-0x0000000000446000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections