General

  • Target

    2044-122-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    fe6b37ad9b515729b6255fae4a39e2f2

  • SHA1

    e5582c9e32474bc78f4d50c1901c24003c6ff837

  • SHA256

    438607ff9c48625e08d5664518477ed88f6c743b97bdf80252835bd34f436b7c

  • SHA512

    fa5aff4f34b802816c671e3dcc9f5fc961c938c73d94c51f22079b73a3697d5780deae62ed199de163fc716a159ccd0b0ab191fdbcb6bf6bb86080e953c0ab86

  • SSDEEP

    3072:YO64zyFlJDGx0HqSYxNXUfMim4G378e8hE:sf1s0HZ8em4G37

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2044-122-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections