General

  • Target

    1752-122-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    e633e6a8b474fc9b02203e8eba6e8257

  • SHA1

    acfa4f6d4cf53b16fcbd34c6edfb527d0da5bd5b

  • SHA256

    e7b5dffef66cdf967b026774c0a674e2fd8a620405ad6c8512ea2fefe30a998f

  • SHA512

    968b7d192a30dc6d4c5a6b2fc205c599ce7c5af5fe24ccb51ca32345dcc26b3fa36674c89e618afb9294935055ab3576d459d6944c199684640238ec78d3bf50

  • SSDEEP

    3072:MO64zyFlJDGx0HqSYxNXUfMim4G348e8hE:If1s0HZ8em4G34

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1752-122-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections