General

  • Target

    1688-122-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    bf5f7b35fe693b843f151b17b87d4a22

  • SHA1

    4b6f3e90b6265d41db0b328aea08017f5ef6e9c2

  • SHA256

    fb61d32d78e2b9128d731f3bfd6dfdaafec7925561aa0d5d822aaec1dbca0444

  • SHA512

    9f6b50181ae5081d53457f23e71263221d247dbf720fbfc229494f84161f99e625d1e1189bdaa4b9686deb66e4a644993c8e62091da4d9a61dde692bc60951ed

  • SSDEEP

    3072:mO64zyFlJDGx0HqSYxNXUfMim4G348e8hE:Kf1s0HZ8em4G34

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-122-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections