General

  • Target

    2920-97-0x0000000000350000-0x0000000000380000-memory.dmp

  • Size

    192KB

  • MD5

    1edecf18345e7e7c555780e1e9892d93

  • SHA1

    be1a25d12d9a018f93f616bc6443b5e09e5a0ad6

  • SHA256

    034956ffed66fae80a2484499c46de1f4149a7cf04c29422aabe9d6720703640

  • SHA512

    e9528c3383d913f8dfcee92ae491348df7b38c3a3f4a4d0ad0f74d08b4c11182a823289e9e47ead6898d569d81fc7b51102724deba0f48028bf33d1d971221c9

  • SSDEEP

    3072:FN9zgaHeuGhriktrBxN3kuZ+zdzW8e8hj:r9Ie4rhTodzW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2920-97-0x0000000000350000-0x0000000000380000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections