General

  • Target

    1360-122-0x0000000000380000-0x00000000003B0000-memory.dmp

  • Size

    192KB

  • MD5

    4d558df4af1e911efe88d5ecc5559e33

  • SHA1

    1f061eda34a75685103c7c09b78fbe31ad40daeb

  • SHA256

    de6a2f8341901436b12e6a2051f84b6b8833aa4e117ae40a3a5fae1f18893bdc

  • SHA512

    896d17bd724e0a6932a2dd444ee12befe70966000eab3d8e63fd0b7589e790e20963130cb4789b819c1382274cb085c4feb1172af0e35d6f363f3d080feb2530

  • SSDEEP

    3072:PO64zyFlJDGx0HqSYxNXUfMim4G3H8e8hE:Xf1s0HZ8em4G3H

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1360-122-0x0000000000380000-0x00000000003B0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections