General

  • Target

    2284-83-0x0000000000490000-0x00000000004C0000-memory.dmp

  • Size

    192KB

  • MD5

    7f1cf510a8b84dc6ee82d0e0c40cba39

  • SHA1

    b11a81ec8c32c00f5166df366d889ea47b7b2c2f

  • SHA256

    084049854522f18230daa09a6ba1d4e99ce9e2aaa7ae74519c6341518b57aadb

  • SHA512

    98d19614adf420ff289395c2609f2b47324815a1fc0ba761c33f91ec3920109d40ef9195ee4586640a1e58191beac2814a71f54fc3d65dea3ccb4ed27cab7296

  • SSDEEP

    3072:AN9zgaHeuGhriktrBxN3kuZ+zdzq8e8hj:O9Ie4rhTodzq

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

furod

C2

77.91.68.70:19073

Attributes
  • auth_value

    d2386245fe11799b28b4521492a5879d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2284-83-0x0000000000490000-0x00000000004C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections