General

  • Target

    1644-123-0x0000000001E00000-0x0000000001E30000-memory.dmp

  • Size

    192KB

  • MD5

    cf445552c4e39cff30bf8663fd1d05af

  • SHA1

    9cf9723b6e39092af4a9e04d2a404783d24b9c4e

  • SHA256

    00b03262173235503ad8f9dec3e9424501916e1d2edcc66f5d2abc1dad5f789d

  • SHA512

    1815699d72d8edba5c2b1d00091a94565d6b8e06a05178a2843d5a87d78aa5ac33a30d3edfcc0f6deb20f977b940629e928c9c684fbc05562a5960aa12ae7b92

  • SSDEEP

    3072:CUUEa9Te3JQBf8td3/oxN1ULH0tym8e8h4:Z7QRyi1tym

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mucha

C2

83.97.73.131:19071

Attributes
  • auth_value

    5d76e123341992ecf110010eb89456f0

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1644-123-0x0000000001E00000-0x0000000001E30000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections