General

  • Target

    3952-271-0x00000000004C0000-0x00000000004F0000-memory.dmp

  • Size

    192KB

  • MD5

    d9b18e9d53b7c4a3b3e1a9467605c702

  • SHA1

    8494c29aed75624348ee95501ec9e58d3139c00a

  • SHA256

    31b384ea2fb8078458faeec2219b1baf8b088e0d4663c6e20f793315a3efb877

  • SHA512

    b8ca124f67022c0e4506812857b42707b2c58508cd52a0768e30980e51d41691ccf527d624c53adeae76556956b44c1b46d336a212e335cd93318686454dcf8c

  • SSDEEP

    3072:ntE62xyQ6d+VeXdxNLgVK880EHj8e8hK:tEmOA9S80EHj

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3952-271-0x00000000004C0000-0x00000000004F0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections