General

  • Target

    1100-122-0x0000000000310000-0x0000000000340000-memory.dmp

  • Size

    192KB

  • MD5

    15457ea005794ad7fe972605d0450a45

  • SHA1

    f136e6dfb81050cdf71bdd12ee6a41acc5d712ec

  • SHA256

    fd603ff1f270e070dce725cff1e5f050a14f0d9936e89e6ee8389f7a5466c2b0

  • SHA512

    b0c88cb41a530a41c9ce70dd85ddb183170b8232ad5c6bf10a1c9c7502d53c0b962ab13b6f522fc887d18a516c8836f988938fd29c16d1d7c8609b9f3387468d

  • SSDEEP

    3072:hO64zyFlJDGx0HqSYxNXUfMim4G308e8hE:5f1s0HZ8em4G30

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1100-122-0x0000000000310000-0x0000000000340000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections