General

  • Target

    2980-122-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    3048910b60453321911913e9ba1face5

  • SHA1

    aef50c66e907ccc72ee34c55e4c8c4b5e4a886ed

  • SHA256

    575617ea3f12853d0d088424422231c4f1617ebbcebff93d3af421a2be7dfcbc

  • SHA512

    d41c06367336cd1bf775a2b61b10da6fdb1d7593d3c2fe40a7d92763eaa085cd9f3ff8401cfaabd2be42c111b4f9e9dc21029e50b9aebb867c37d96c3b081c2f

  • SSDEEP

    3072:LAF5KBstbkeNKZIhDDxNcaoMczCOI8e8hL:MXb33hDYjyOI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

jako

C2

77.91.124.49:19073

Attributes
  • auth_value

    3db90f2679ab2890874898c7c6d65799

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2980-122-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections