General

  • Target

    1936-123-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    4b8427fd3f68c8414160058be05cbb2b

  • SHA1

    3b8378e3e15a80e089acc3411861a1d70b85ece1

  • SHA256

    a80e0a1252243b8eb4c304445ab35d5dac2181c8891129d4ad8932910067b0e3

  • SHA512

    07d7bf28337960a8771cef1a8b3981762103bdeb9f5c54c2f971b0e258ce2a03950a43ee25ee941318d5440da86f18aaa4bddb9de6351cbd53e467d93ff72b88

  • SSDEEP

    3072:qUUEa9Te3JQBf8td3/oxN1ULH0tyO8e8h4:h7QRyi1tyO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1936-123-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections