General

  • Target

    1660-123-0x0000000000360000-0x0000000000390000-memory.dmp

  • Size

    192KB

  • MD5

    63b28bd2bd263a4be2e8f639fdc4419e

  • SHA1

    41781753f717fc05c160355c2387d7dec488e5d6

  • SHA256

    249f67ecb56b9cfc0afc27d314e3347d646cf572618420636218b3c3cc4c3833

  • SHA512

    8f81939b3a97f3cc94ce71ca890ca74e5cfa8ab2f88e0dae4880b0efa17b68eb044c97824e1b81a9a77722a4e1abc831a813984523bb7d4c405993be367b3976

  • SSDEEP

    3072:RUUEa9Te3JQBf8td3/oxN1ULH0tyd8e8h4:y7QRyi1tyd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1660-123-0x0000000000360000-0x0000000000390000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections