General

  • Target

    2904-83-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    5660de863c691b62d187f3a79fb5b5c4

  • SHA1

    75d987e81629b2b12783a5492b8391ac6749d4ec

  • SHA256

    985e77a06d2d94ccd7b4627669b6569b03308834125e8276bdffc6083e8d9885

  • SHA512

    45e872fa596745becf1b8cd23394e97b8abc2387c17f413b47e69a5d1927e62a49da3d9780dd4bfd0b49b83e98c0f1afc9c38b98f2eb9b2864d6ec2862cb7dea

  • SSDEEP

    3072:YAWi/g1IzuRb5xNAKY73zOyuj++0e8e8hk:Yzi/+VCHuyuj++0e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2904-83-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections