General

  • Target

    2072-122-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    a789a26a0b8c3361512372ef3f04105d

  • SHA1

    f370bec18fe6a09ce86be858f9a234c8db3f26c1

  • SHA256

    a72d1e0a13a1f1e13380628c5f82e9b6991640af21b7448c3a2f8340ab49c34b

  • SHA512

    ae18b9d1bd94fb2a3a73c99a4c4af32a2c4bae4eb111c300d8a2c80837fa9a17ac05311a7c49dd45b245c3cf405c14f7d16e0664d7403f284d7a241ae3ab4521

  • SSDEEP

    1536:AlBA36sv0W7T1sjvrHzbNSISuiiB0J57TNyQGxNXLYQLrbuLh8yrEHVF+0GkR68U:ArqCnNsZWSZ5GxN8yi8yIHVF+Z8e8hO

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

masha

C2

77.91.68.48:19071

Attributes
  • auth_value

    55b9b39a0dae383196a4b8d79e5bb805

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2072-122-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections