General

  • Target

    4776-268-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    1726038f0cc91d38030503e97d901a07

  • SHA1

    d075bf4b66f9e238f7d39a5236b402386e989321

  • SHA256

    546d120f985fae5e182417be78827aa961be22cc57b549845b437d7f511f01a9

  • SHA512

    eeb2b02907c466a202abab4f5d746d2b82458575fbcc923f7a598c0645d69950ebff7fa501c9b4e6a7be7ef39c41d92ada3ab3b9e2bf0d96d638e90b514f12d3

  • SSDEEP

    3072:kAWi/g1IzuRb5xNAKY73zOyuj++0r8e8hk:kzi/+VCHuyuj++0r

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nowa

C2

77.91.124.49:19073

Attributes
  • auth_value

    6bc6b0617aa32bcd971aef4a2cf49647

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4776-268-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections