General

  • Target

    904-83-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    2d88e6ea416b9a7c944fc00139d1123c

  • SHA1

    a5e777d6e1c9f87d5b9e845aff433755f833ee56

  • SHA256

    5448cccde914fd795bf0a22e5ca7e27a590b84b157ad827976472e4ae3fe862a

  • SHA512

    85fd0885c78178786159af65ddf1bd5be12524773e91279bc68d4f4100284ca0a2f0e1dafcfacd1ebbfb40562147f1e5dfff52b7cf30bf6914d8bc430b20d2f2

  • SSDEEP

    3072:LN9zgaHeuGhriktrBxN3kuZ+zdzn8e8hj:R9Ie4rhTodzn

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 904-83-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections