General

  • Target

    2020-83-0x0000000000350000-0x0000000000380000-memory.dmp

  • Size

    192KB

  • MD5

    4d1a88edd8816a4f397d9ad7264f8a6a

  • SHA1

    2c19bedd951137a464686a39af3f96a1d33c2b23

  • SHA256

    4ca7236a37642ecd4ab38534b8ed7286d6c817338eed333cf9df43624d20582b

  • SHA512

    c6eff901cd8b2b2d4139099222b2911b1fccd989a81b4e5e66bcf3dcad5c8d6d7f6f579e6efa6b41405d7eccd9bfe56f362c52832df9907d6d706d065e7e8a1b

  • SSDEEP

    3072:qN9zgaHeuGhriktrBxN3kuZ+zdzW8e8hj:Q9Ie4rhTodzW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2020-83-0x0000000000350000-0x0000000000380000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections