General

  • Target

    2068-130-0x0000000000270000-0x00000000002FC000-memory.dmp

  • Size

    560KB

  • MD5

    a87c35900a0ca2f3de81fb2674cb4e81

  • SHA1

    c51af09765fa8b0943609de1b8e49ac81f5eae79

  • SHA256

    cdaa0748318e1454df1246415b4661d0e9461df1264a55dc003d4d09ebe29061

  • SHA512

    47d8f3f226bc26cbd01f37b73b920d5bfc015e126432dd98703f5b4838fec8d4d1b5b821c9e26a4bb791ac70f44a51daee2a2ea495a223b11356bab7c0ab38ba

  • SSDEEP

    12288:yBuh9USLdHMwfS5T0lvI/+am7aFegmydD3KpZlgTXffnv:yQh9LdH98Tp+amj9ydD3KnW/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2068-130-0x0000000000270000-0x00000000002FC000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections