General

  • Target

    1696-122-0x0000000000290000-0x00000000002C0000-memory.dmp

  • Size

    192KB

  • MD5

    9e126b8028d92ea1b73d83ab8ff42d6c

  • SHA1

    fd0a118b76695cc546d486722c05e3a6c3c7c7ca

  • SHA256

    646198beb72edbff9ad36ba534f28af732e7d4576bce2bc87a574f11580789b8

  • SHA512

    60967e0f1f91e2a5d16d3e247c46ee5aa3f5c67fbf52aedaf0e8d8c9ed7f44521c14b4dbfb80e946fe7ab5e9df4b4edad4f63ddd12e08b29b740d4760d6312da

  • SSDEEP

    3072:VO64zyFlJDGx0HqSYxNXUfMim4G388e8hE:1f1s0HZ8em4G38

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1696-122-0x0000000000290000-0x00000000002C0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections