General

  • Target

    2172-122-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    ba34a31325359dedb4cf49e772b1dd2a

  • SHA1

    d9fb7c9f60d5100e6fc136ef1766b33067dc44b1

  • SHA256

    07d1d8a5d2899f63c49018868c7730a3509ebbd21a53499951d6169f67a07206

  • SHA512

    29d2985fec561db1298e3c0dfd895bf6c3a44aaee4f440870c3ea7327819a5b21fdd79561dcd1cfb81a7d330672aa8727afc0980a7d89ea15ba6b31f083942d3

  • SSDEEP

    3072:0O64zyFlJDGx0HqSYxNXUfMim4G378e8hE:Af1s0HZ8em4G37

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2172-122-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections