General

  • Target

    2012-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    7e6861d7f556ca8891069429c0c71872

  • SHA1

    9a901969f8dbb4a8f974fdc8e725749371ab61f7

  • SHA256

    ce65c3d6fbcc29ade00f3ac4928e993c9bb8068f4dda46c62876cec36dac4a97

  • SHA512

    d94e3c299f656ebdaff56d363df846ef03395866f668f2b082a6fe7e3a81f4932f59168d0afb550974dfce977e15aca39b275a5f2b2751c370e5319106a432bb

  • SSDEEP

    3072:0N9zgaHeuGhriktrBxN3kuZ+zdzB8e8hj:i9Ie4rhTodzB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2012-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections