General

  • Target

    2648-160-0x0000000000310000-0x0000000000340000-memory.dmp

  • Size

    192KB

  • MD5

    2b710806ab5dd30938d4f8e6936e5594

  • SHA1

    0e0b6da431383085a4825c1ced80f3f65343f38b

  • SHA256

    ddab253ffbd5ce59432cefe9525d7d9e5f4f83e112a90e84e26f16ac04cad205

  • SHA512

    3dfbb8ba93561c8516eab1c520be22a5bf749a612939c54cea28d5240e6b6fb68098be55912513b59cbb3d930528c9e72a6f1363e04e577456fb5f9c44a44534

  • SSDEEP

    3072:5IV6GXCa9azR4Y+D3u9xNmef3Gx/kufrqT8e8h0:5IV+4PesJx/kufrqT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5059662751

C2

185.106.92.73:34437

Attributes
  • auth_value

    5a61990e75c94ef341ae930f2e5368d7

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2648-160-0x0000000000310000-0x0000000000340000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections