General

  • Target

    2360-83-0x00000000003B0000-0x00000000003E0000-memory.dmp

  • Size

    192KB

  • MD5

    751ccf8305d0b26243821723825edc30

  • SHA1

    0043ab246ef97c85a910ce848f8b7a9d73e16e5c

  • SHA256

    c61838cc4acd3f61f14fe535b2ccf7b1201a3c481b6a345f5cd9c17263958696

  • SHA512

    ae9a04393c7f82ee6fb0e11a74c5a40e0ed6f0e043cbb8c235c6ed9d7737423e390cae7310168b49916549d872db5457784a7319589285bc5dd3fe674382f816

  • SSDEEP

    3072:qN9zgaHeuGhriktrBxN3kuZ+zdz88e8hj:Q9Ie4rhTodz8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2360-83-0x00000000003B0000-0x00000000003E0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections