General

  • Target

    1032-122-0x0000000000320000-0x0000000000350000-memory.dmp

  • Size

    192KB

  • MD5

    cfb2a0455ad0b6bc2b85d0f5c3abdbda

  • SHA1

    f7879e3244ab0a7b0d9855bf0d2c1e09fe77e589

  • SHA256

    23e7bcf7d3dde9332bb2205a1e484deaf1a55ce7411ca7c519f2cd0eb76f4c2c

  • SHA512

    76a7b0f05ccf60f0bc917c6a3a9e8a4a4753807786ff48ea1f123a017078efb94b80b83ea42c66ac7ab2d5109b26dab7797f969e8c815e72e4f4ffb2c418960f

  • SSDEEP

    3072:SO64zyFlJDGx0HqSYxNXUfMim4G318e8hE:ef1s0HZ8em4G31

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1032-122-0x0000000000320000-0x0000000000350000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections