General

  • Target

    2092-97-0x00000000002B0000-0x00000000002E0000-memory.dmp

  • Size

    192KB

  • MD5

    47349aafa3a4af3eeabc937a6556402f

  • SHA1

    5c826083a5a6153597fe8c8e9aa4aacea3d5fa6e

  • SHA256

    d4427af3a3c1d14a20921f0082db97822453e4d465a8e46663ce0fd8d8bbaccb

  • SHA512

    fb60643c8602bf94b480a956452051bbcd2597a4b94444aeee10fb055bdd14f5442b4cdd51169b31bcfebe4520c00c4df40f4238c9cc513675348ad445f3d6d2

  • SSDEEP

    3072:ctE62xyQ6d+VeXdxNLgVK880EHy8e8hK:EEmOA9S80EHy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2092-97-0x00000000002B0000-0x00000000002E0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections