General

  • Target

    524-97-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    3af96e5811b7216b88f88a598bf34699

  • SHA1

    0f9d5a6a3808b7f5e0732cc934d1d969efc26291

  • SHA256

    81c61bf7caea740efe1af2e256a2ea0745e14a21461f40f5cdeae894e28a8610

  • SHA512

    71f936b7df03e8ac6fe67e1cea54e29ccbe067f312e2960717942d8ffc7f0959d8b4217a6f65e44588e34938ddc3ed638ad5692f7a1cbff8ef3aec36f0772b5a

  • SSDEEP

    3072:VN9zgaHeuGhriktrBxN3kuZ+zdzk8e8hj:b9Ie4rhTodzk

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 524-97-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections