General

  • Target

    1588-122-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    6912c00091a98530d6b3ae02d4c163ff

  • SHA1

    5f1ac94d4fc4cbcac75b7c45f10ebd0c4a21c71b

  • SHA256

    bc9f023bd25a8b1d71c446218688fea0fa1bef692eb759130c26b771f2788924

  • SHA512

    3fe71145f339fd88daf81fcc870f073da822902bd3f87fd977ac5c56d97c871f1358a61a95f7590369df85532ac1ed8a083579034ecc532c24be8acb859f8b03

  • SSDEEP

    3072:4O64zyFlJDGx0HqSYxNXUfMim4G3i8e8hE:Mf1s0HZ8em4G3i

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1588-122-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections