General

  • Target

    600-76-0x0000000001110000-0x0000000001162000-memory.dmp

  • Size

    328KB

  • MD5

    0cd0e33524c6199c5a00895c1e69cb24

  • SHA1

    433ee5a447b17215720f3b075c38bb5351708b77

  • SHA256

    6ebc631ae4eb7a5d614c5d1971b52e2ca31f3b60f84f539c419905b2303ed371

  • SHA512

    6c590d3815f2011682ff0f626a6efe450ebe3cfc255bea1a91f515163811ba43efa1701cca9848055629fbfee5285f42e748b5d2d6635a2927ca0644e579b904

  • SSDEEP

    3072:Jq6EgY6iorUjVA8/wPTuSIuVTAPtASir7cZqf7D34teqiOLibBO2:YqY6inwPlIuVTAlAl7cZqf7DIXL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1

C2

185.215.113.67:26260

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 600-76-0x0000000001110000-0x0000000001162000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections