General

  • Target

    1860-83-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    5550966240f3683d0e42e847bab14a5e

  • SHA1

    88878fd6b4481ff9f706290e70cdc3b01b5199e8

  • SHA256

    17cae7b746a406a91dfb56470f83d157d73d038413bac70b849aaeb0a5ecd0bc

  • SHA512

    1c34d9236a2b539427439e9f803a9c27b27704ef5b994265098bf93a551ca6b8dbe63ce72e0cd5c3c2a2a63f387708883068675756b18bafc310c29573c068a4

  • SSDEEP

    3072:VN9zgaHeuGhriktrBxN3kuZ+zdzI8e8hj:b9Ie4rhTodzI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1860-83-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections