General

  • Target

    3004-1-0x00000000001C0000-0x00000000001F0000-memory.dmp

  • Size

    192KB

  • MD5

    3871890f7727aacbe29b29748a2e2fe7

  • SHA1

    cdc5e8eed9422efa96ee2c225da8038b3a5a4155

  • SHA256

    7057225594d231d86d9a9150312955e7a1ec2ff987db503deb5977523347c719

  • SHA512

    4f99ef65700a6942a17165e67f6b0f1eb5e3e4e8024f8e9cbee5dd79859a431de561be9d3d9ceb8d4086ea58a10daa5f2b84a4555b471ce303bce3e1b4140d82

  • SSDEEP

    3072:Kkh2yqg5JI0SE9BbOXtgwXRPulE0qd3nJNgJI8e8hM:Kkh2YJI0SE9BplE0g5NgW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

trafico

C2

176.123.9.142:14845

Attributes
  • auth_value

    ae8f72bc34fc0c248b3abb9f51375751

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3004-1-0x00000000001C0000-0x00000000001F0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections