General

  • Target

    1956-272-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    0f5fb9b97bb1b7d6fadd06a0180c5366

  • SHA1

    423c67ac2117ebbf1921a5a6076ee7735040fcef

  • SHA256

    bb025d8786be68c3013a9c8192a07c37a55101ec5106f6db7a51f1b26d879c67

  • SHA512

    1eced67e4b4e6d511e4026b6ac0c6cfdbbbecd15746df1f8ec6db4f5e68713735cc359d646e5c2be3f44890bdae091aeb33d991c6f6ead12f193663ee6468a39

  • SSDEEP

    3072:VAWi/g1IzuRb5xNAKY73zOyuj++0r8e8hk:Vzi/+VCHuyuj++0r

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1956-272-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections