General

  • Target

    2032-81-0x0000000000780000-0x00000000007C4000-memory.dmp

  • Size

    272KB

  • MD5

    c31d20d3605db76cbca2396823c24793

  • SHA1

    1acf43dd8e99d14f2eed2b1926eb2aeb25523620

  • SHA256

    6f5273045dc28106678ca95e8fc88da1f84b14c929ca634b50885d8952906849

  • SHA512

    ff96ee5941cb00b54ba1348b40579837ad0b05758c35c1849d5f4b24001c5ce580119fd426ef8207d82920159ae554d5c3c2c931611b6ce14aff43c975c55117

  • SSDEEP

    1536:zaqXQzahmtnTT17KLeFq8sbLtuUI29+xn5MOZbV7cfaVPykMJrF:uqXz0TdKUqPPth+xbBqiskArF

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5637482599

C2

rub.defauld.top:40309

Attributes
  • auth_value

    a1bb9837c35f9e12335619d257888537

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2032-81-0x0000000000780000-0x00000000007C4000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections