General

  • Target

    1840-122-0x00000000002B0000-0x00000000002E0000-memory.dmp

  • Size

    192KB

  • MD5

    12aea7650b5307527012d255222e127c

  • SHA1

    a2be69dc2b98add0e38a24c2f3384b81d0bdeef4

  • SHA256

    f887cfd74d3dff12b89494f0c9cc7d37e652cb2b6c605b944318ab53c24ea6b1

  • SHA512

    6b2f0d3d192a7177102c96bac2b5654eba3aadf9b6b6ea832403ff8ca8bef1c4bac18ec571bf0490cd1fdec9fd413d40469d034c8913c6788941acc3f292947a

  • SSDEEP

    3072:PO64zyFlJDGx0HqSYxNXUfMim4G3K8e8hE:Xf1s0HZ8em4G3K

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1840-122-0x00000000002B0000-0x00000000002E0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections