General

  • Target

    2236-97-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    eb160ea3d82f108813559d3b33932d1b

  • SHA1

    5a3438bccb40bd47a2b4bf4e731be07d1df95ef9

  • SHA256

    3b9d2bb071c2b3afaa7e03a3c47848adc524739d26664e79c79c638015576971

  • SHA512

    0e5460d05c5a9a7740fdc1bb663469026a02fb286b0e268cd31e8bf501486735b7df70c1e6e36cc1348f12a35c7c5b52aff37f5d59c3a9365018e029bcf617b8

  • SSDEEP

    3072:UN9zgaHeuGhriktrBxN3kuZ+zdzq8e8hj:C9Ie4rhTodzq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2236-97-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections