General

  • Target

    2932-83-0x00000000002F0000-0x0000000000320000-memory.dmp

  • Size

    192KB

  • MD5

    887e0160e4f4c6742d126238ea968517

  • SHA1

    709877c96d757dc85054497dc8feb2e01e535e3a

  • SHA256

    3b119638b830f1da47aaa0e7edb8bd023d771c0b7f1f5b372a98bf00e38e43d7

  • SHA512

    cf20ca0c6c6edeaa2d8c97fa35654af56fcb28da289ec7907fde56d2012ef035dec1356d349a97a501da3bbc29accb35b0d4e5b83f913780f28ac9de939c7e21

  • SSDEEP

    3072:lN9zgaHeuGhriktrBxN3kuZ+zdzg8e8hj:L9Ie4rhTodzg

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2932-83-0x00000000002F0000-0x0000000000320000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections