General

  • Target

    2568-83-0x0000000000350000-0x0000000000380000-memory.dmp

  • Size

    192KB

  • MD5

    4d3d3efa7be508b998de8e5367f4a345

  • SHA1

    c2de9d233a08b78174cadb8e4159c2f3eaf48a2c

  • SHA256

    2fbc1f30c24946c669a4e1cdcd73326263fc6b7947840f7335db5f3787d391c1

  • SHA512

    a7832c147e2f48fe97b3a42d70068f304f9fb3b035aa50a26053600b1a5fcbf67130a8aa294bce0db1dcf4e588139758d76f05bcd4ac07eccc1631a3d6bd107b

  • SSDEEP

    3072:zN9zgaHeuGhriktrBxN3kuZ+zdzW8e8hj:J9Ie4rhTodzW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2568-83-0x0000000000350000-0x0000000000380000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections