General

  • Target

    3420-9-0x0000000000560000-0x00000000005B2000-memory.dmp

  • Size

    328KB

  • MD5

    44b171fa85c0befc43f924d8c4931b24

  • SHA1

    8b3521b3a37e14a1cadb30dd5f4185847b13a858

  • SHA256

    6dfe141c7f462c24a69af57552e7c11a3b58d5af38a7293c3bbf53a9cd9fa6a8

  • SHA512

    2ec30e0fe4d8d5d6211124cfb978d539776934c99cf4dd37b3a2e2ce735bc0292ecb4721dcaa22053310d418002bf82d5677d20cc6d552973014574f839bd933

  • SSDEEP

    3072:3q6EgY6iQrUjr+N44wPLQSITJtTAVtASi3QcZqf7D34deqiOLibBO7:6qY6itmwPfITfTAbA1QcZqf7DInL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@BangBang777

C2

147.45.47.93:80

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3420-9-0x0000000000560000-0x00000000005B2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections