General

  • Target

    836-5-0x00000000001B0000-0x00000000001D2000-memory.dmp

  • Size

    136KB

  • MD5

    ce876b7309b181fd19001ed35aebca1f

  • SHA1

    c3918dde81a794d1a7ca9f2004d19f925872bafb

  • SHA256

    2bf6f07731122d8fd8f6b5f8d2ca56db22ef28beb423f3045ead5c5051962d2e

  • SHA512

    85157cb67fe43d1d2369960acb9d75aa6c0d1bf982ab7437f057545d31152a269980c440a10154a315af59cf3aa2ef719a3ee857ee799973208720d8f68c2295

  • SSDEEP

    1536:yA/bDr5J0AmS4lZyNtxCuC8+nB8N4c3oJzp0tFSnH8Nby+xXm8lMGGH26A:yQ7Z+nB8N8CjYmyoWvDW6A

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

7001210066

C2

https://pastebin.com/raw/KE5Mft0T

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 836-5-0x00000000001B0000-0x00000000001D2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections