General

  • Target

    1376-97-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    85d073b8e8a175bec907d153f4ac3b5b

  • SHA1

    7483e90d68a5572b009fa641c90ffe847d7d84f8

  • SHA256

    54174a469612c0db39ec02214afa6959056f0ff164c0bdf03523746f521b7953

  • SHA512

    dda1080a40632a70c125f3549b563f4d4ccf49b5b9a426a72bf152456a2c2fbe7d3ae1befa9c0952161b5e0a119695c13db50ea2e64aa0eab2c1d8ad00fd9498

  • SSDEEP

    3072:cN9zgaHeuGhriktrBxN3kuZ+zdzq8e8hj:69Ie4rhTodzq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1376-97-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections