General

  • Target

    3092-186-0x00000000002F0000-0x0000000000340000-memory.dmp

  • Size

    320KB

  • MD5

    a1468b90fb4347ccf52e025fd9d15c12

  • SHA1

    b3f73abe708434daa286837cb320cd82de2300ee

  • SHA256

    60b3a4596f0eed58fad314ce217500c03fc358f2a3b1c40009a65f5dae7c4b90

  • SHA512

    6bd32ec9cf31cf62744325d27cb252bd6ddc57f47b99428bb12beb1235468b355ed04a075919c14af12b8002a37267c226ca2cff786af5a731408130675cf1e6

  • SSDEEP

    3072:xqK8kKqJ0kadS0V8HO4ZrgvsJ8y0IHw9TZJMfPTcZqf7D34VeqiOLCbBO6:QBkKqGF8O4Zrgc8Z9TZWTcZqf7DI/L

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Jok123

C2

185.215.113.67:26260

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3092-186-0x00000000002F0000-0x0000000000340000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections