General

  • Target

    3032-122-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    a7e0976800bb1898ecb894606074410f

  • SHA1

    b54136e30370a875031071bcfe109e12da49c504

  • SHA256

    69b233c9d7d0af3fd57b5326b1f807e798204aa4fbdb8cee77775f26e2a96695

  • SHA512

    13cdce430e07f8456d477b110c0484a0cd3aae5c9aa74aa00a98678c11cedd5dfccf8f74b94cf2b850c5da203349ca9409d15bbc6a6f43f84f4e3b41efa6fdbd

  • SSDEEP

    3072:8O64zyFlJDGx0HqSYxNXUfMim4G3p8e8hE:Yf1s0HZ8em4G3p

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

norm

C2

77.91.68.70:19073

Attributes
  • auth_value

    1514e6c0ec3d10a36f68f61b206f5759

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3032-122-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections