General

  • Target

    552-122-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    d680c70c657c11708df4e35f6db60e5e

  • SHA1

    fc898091345d879337cc2d35f84d71168977fc75

  • SHA256

    a3a0ab2a61e32aa811378a54da77466da09565d2df411df6740c166639382f39

  • SHA512

    46c74a95c109e5236d0072fdf290407aa0e4f03fe06e30bc6abda8e3dfa294312b34d8268b2c77e5a05d7c4aa4f4df9dc45370c0f154aa68045eab5c336953d7

  • SSDEEP

    3072:FO64zyFlJDGx0HqSYxNXUfMim4G348e8hE:Ff1s0HZ8em4G34

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 552-122-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections