General

  • Target

    2760-83-0x00000000003A0000-0x00000000003D0000-memory.dmp

  • Size

    192KB

  • MD5

    007961bb3b8e69b9369470f0ff00f142

  • SHA1

    ae24470baabb0c3b96e2616f7ee8f732c1c4e509

  • SHA256

    1a5a40d38999b74940369bd6ad25b930c952474a5944ff86bf36461e8007ca61

  • SHA512

    e8c0e27eeda2ec13e62bc55fce684c9e8b3e8263899f52d29b43c9cf01a026137e6f165b1f676df3ad57d89fa6d7eb3b792cacc8b4a64e94ca0f0c3eb156a526

  • SSDEEP

    3072:RN9zgaHeuGhriktrBxN3kuZ+zdzX8e8hj:39Ie4rhTodzX

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2760-83-0x00000000003A0000-0x00000000003D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections