General

  • Target

    4464-270-0x0000000000560000-0x0000000000590000-memory.dmp

  • Size

    192KB

  • MD5

    4b2603fdbb44cb7a06395debeb9137ce

  • SHA1

    a0972459b21c44f434322b90f1796c790580e971

  • SHA256

    664d1f8556614ddca3738e08111363177f4f87382e6ef3f3c41e485095b3be2f

  • SHA512

    7eed104021be0c8fbceacffa61d712066544444929d19d1c78bcde7a0ad897eaf7e4f7f1b6c47c488f197d351466d322f2166267c4223e98ba5e753c6a9f7c7a

  • SSDEEP

    3072:2AWi/g1IzuRb5xNAKY73zOyuj++0C8e8hk:2zi/+VCHuyuj++0C

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4464-270-0x0000000000560000-0x0000000000590000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections