General

  • Target

    1884-272-0x0000000000670000-0x00000000006A0000-memory.dmp

  • Size

    192KB

  • MD5

    c5b2c5f753a359541628cf4e4a2a375b

  • SHA1

    2cac00d69ea19c7cbb52fc3ca4374fe107c04eb8

  • SHA256

    623372a3d79c8cfda32cb1484f5ee6197d184a08d4d9bb5b5f5fe094cbb561c0

  • SHA512

    f23f49efbe7373e4564e20b5cccfcef47c2c27d73806e09a49fc3925f03c8fcfc7b18d360cd8761235783c51addc71f630f0b2bf99c9872e2ed04cab35d24440

  • SSDEEP

    3072:rtE62xyQ6d+VeXdxNLgVK880EHu8e8hK:ZEmOA9S80EHu

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1884-272-0x0000000000670000-0x00000000006A0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections