General

  • Target

    1048-42-0x0000000000520000-0x0000000000572000-memory.dmp

  • Size

    328KB

  • MD5

    addedc95c2465755a1f02b009fea4888

  • SHA1

    0b34a8ff75a1e7d784f0144c744a7215e5c3190d

  • SHA256

    ad3aee53ad4024a57fc496afc74ee18f39061c143b86fb309de0a3af80c89add

  • SHA512

    adeb14c3d6e4557ec4e6c84efb109fa5742107734d553ffad52306fa3e3eef055ab581f5721658161a27942b4313de2ca02be3bdef527e98590dab5527019cbb

  • SSDEEP

    3072:aq6EgY6igrUjsgMmwPPoDqeRFSCotTAbtAYKtJcZqf7D341eqiOLibBOU:ZqY6iXwPwuaFjGTARANJcZqf7DIfL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Logs

C2

185.215.113.9:9137

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1048-42-0x0000000000520000-0x0000000000572000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections