General

  • Target

    1600-83-0x00000000002D0000-0x0000000000300000-memory.dmp

  • Size

    192KB

  • MD5

    8345e2e9889c9c8187fd15e2d1d4fdc6

  • SHA1

    781a75048695e6d04f5d5f920769d35b2b57e430

  • SHA256

    be72f88bb207a8461e6827b0f4bcb0a59b96b7d63e8209c37e740abf92a62299

  • SHA512

    6094b5ac6d7bf80003a59ee208416e2e3ce303b34dfe0df2e2e093aba7b77269caa9301adcb812b105f57c94852c0eeb2c503c0153a4e0c4e11792c82a3b408d

  • SSDEEP

    3072:itE62xyQ6d+VeXdxNLgVK880EHY8e8hK:OEmOA9S80EHY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-83-0x00000000002D0000-0x0000000000300000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections