General

  • Target

    2924-122-0x0000000000390000-0x00000000003C0000-memory.dmp

  • Size

    192KB

  • MD5

    0b9a377793df3a3152feac37e061b4b4

  • SHA1

    ce27d9c6488bede81d401e2728f63ac9ed96546a

  • SHA256

    5910d804efa9248757c6ec2aa21df361843d3b3860558d322a93862af91ea6aa

  • SHA512

    f977b58f63ef2b9ca91e971c7fb17b9d9dffe8613013a05e6c4f7a2523235b9a7895ce0687017393abc6b10e7273da3fd071104d582e2f1526416c359b4d17a8

  • SSDEEP

    3072:hO64zyFlJDGx0HqSYxNXUfMim4G3M8e8hE:5f1s0HZ8em4G3M

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2924-122-0x0000000000390000-0x00000000003C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections