General

  • Target

    1916-62-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    b7b76e783214241c449df7874296e873

  • SHA1

    ce9af8bc9247b452036a4d102bdbd070b6ea7d81

  • SHA256

    1ec07e9809af2d29e0a9ca63dde1de1d3a69bc7fe5f91bc24801c9b3944cbd0f

  • SHA512

    c4b558201294952cfb98d683475310372bae2796fe027de69498daced9046014d86bdfe3a0915ead6848fe707f74397e7b9b1ee0ba1524577e8313b128946fff

  • SSDEEP

    1536:Fa3YQzahuRwR/xkKEKJ9IJhRSeIOV59MghbV7I/Ch0TkMJrh:I3YzFReKp9ORb7JeqykArh

Score
10/10

Malware Config

Extracted

Family

redline

C2

37.220.87.13:48790

Attributes
  • auth_value

    ad9ddedcc84f0f07f1c53ae5fd0df093

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1916-62-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections