General

  • Target

    1972-123-0x0000000000360000-0x0000000000390000-memory.dmp

  • Size

    192KB

  • MD5

    e99ac72085662263b241cea93e849ce1

  • SHA1

    f2fc24de98a24a5f1957d1ebbdfe1a49ac4ea98c

  • SHA256

    b572edbd8865af37c5881a9aae577261e1a9aaaec05ad1a1f58085e2b7a90706

  • SHA512

    54673c82255fad1b9b63e1d37ae2bc60ca05faeea4f8882843e51a2bd327d89aa9ab6ea8d4a689fd5bfa0abcf7cf3d0fde040bb0e0aed0039798f8b0a861388d

  • SSDEEP

    3072:pUUEa9Te3JQBf8td3/oxN1ULH0tyd8e8h4:q7QRyi1tyd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1972-123-0x0000000000360000-0x0000000000390000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections