General

  • Target

    948-83-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    8c89a2f93955e594bc46205233a4849a

  • SHA1

    a6012c9a205d039ca018b6a62e311056917a34f3

  • SHA256

    2b825aed0b2176861dfb58584003bfd0d588b5c4be2511b85d0c724436bc5d26

  • SHA512

    08ca7c08b98d77e42f372f470c65ae227e3eb507084e042018c04355cf117b2b8ef079b058d8489fc56b10f08eddc1d6beb627bfd7cf10aec1f788079c34938b

  • SSDEEP

    3072:cN9zgaHeuGhriktrBxN3kuZ+zdzI8e8hj:69Ie4rhTodzI

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 948-83-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections