General

  • Target

    3068-83-0x00000000002D0000-0x0000000000300000-memory.dmp

  • Size

    192KB

  • MD5

    f4bc0565c3a2052ebcc3463c6355022e

  • SHA1

    535277f09459809deabdfba4f0b16d4f759ef780

  • SHA256

    6c15efb1b648ef0c5fb7c8b856e122dd64b02e83d6896aed091d987190103bf0

  • SHA512

    9ad424dfa4fb84f21a57592fd329adce83fd1388c5c98ff6727d6435a8e4bf61d71ac182ede49f8cef19ca751d631569c9adc3a28cde88a05e243043d477a6c9

  • SSDEEP

    3072:fN9zgaHeuGhriktrBxN3kuZ+zdz+8e8hj:V9Ie4rhTodz+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-83-0x00000000002D0000-0x0000000000300000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections