General

  • Target

    2948-83-0x00000000003A0000-0x00000000003D0000-memory.dmp

  • Size

    192KB

  • MD5

    127e9ea6a184870e4cdbd00cb5a7e140

  • SHA1

    8e44d91d5ca45cb73bf7f3e379127f7d99f9cc95

  • SHA256

    9a36f8ac703a213209fc96600145052f0612fa73e3a93312a0e7525a543bbf48

  • SHA512

    43493ba783ff85072d9e83388dc2dad3edbfb2419552ab78582d00063468f661a0c93031e036e548fe40ee7957845cecb2b96bf18e870b49b3d731fddcc6b86e

  • SSDEEP

    3072:6N9zgaHeuGhriktrBxN3kuZ+zdzX8e8hj:A9Ie4rhTodzX

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2948-83-0x00000000003A0000-0x00000000003D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections