General

  • Target

    2052-12-0x0000000000400000-0x0000000000452000-memory.dmp

  • Size

    328KB

  • MD5

    e6ee7bda0a244f995cea2a33e6c6ff7b

  • SHA1

    f2b5a54a11a2b65549f1405208949aed6d62ccd1

  • SHA256

    12649e8a6f811115a81826fb58b93850e60f68defe3461cffc1fb5403c0100f6

  • SHA512

    2088b8751f70e7983a1bdd54f9c1f4982a189c564bfca4aba2e83ac66f17f24d94b7ca4640ddffaa3c3fcf5d46bc3756daaf571aa9ab5779e764d8a32e0f7a40

  • SSDEEP

    3072:icZqf7D34kp/0+mAckyQE1Q0glNvB1fA0PuTVAtkxzh3R0eqiOL2bBOA:icZqf7DIcnmyTB1fA0GTV8kf8L

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

FROSHLOG

C2

94.141.120.25:1912

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2052-12-0x0000000000400000-0x0000000000452000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections