General

  • Target

    2020-57-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    0636bae51f61f6f41b20a4b97c05a766

  • SHA1

    c97e2ab90ab19180d4c4727c737ae5ca5a136aa6

  • SHA256

    6c76b5a03556da9c2d9079c959e9160aa5282e87e6806a39f9ca43d721e5d582

  • SHA512

    e30bfb126729de790af760e4187752f31cd76b94101853bbdc4cc88fffe28b8929c514813c0c2dd2f26990f78f7b66ef3113b8880aeee7ac0cd2d6a69be3f913

  • SSDEEP

    1536:HAHWvUqRV36sv0W7T+GP/rHQOav2HMpp6h/coJyykxNuZYQXjbuB+0NfiQLj6qeq:kYrD0OO62oJJJkxNBWXuKQLj6qe/

Score
10/10

Malware Config

Extracted

Family

redline

C2

176.113.115.203:4390

Attributes
  • auth_value

    b73f21d8fec30b62995740e4608591e4

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-57-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections