General

  • Target

    1560-123-0x0000000000230000-0x0000000000282000-memory.dmp

  • Size

    328KB

  • MD5

    dd82cbec3c81902b262402603a02cb03

  • SHA1

    b1f918c0517233a679a746baf9b04b92ae255439

  • SHA256

    44fdd5a8c41f60705df419e80c11a2ca4b001771977323e8ddaa2798ce8671a8

  • SHA512

    0e755c05c14412413111da6ac4e5af0aa16956d3e58eca7de50799e017da95532b048f569e25a91941b6c66e6c6f9bda6d62788b2b647b81bcd96aa716cf08c0

  • SSDEEP

    3072:sq6EgY6iChfrUjHcQZwP7h5kQgnKyyeTAXtUSiVlcZqf7D34leqiOLibBOe:nqY6iChawPfkx7yeTAdUblcZqf7DIvL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@CLOUDYTTEAM

C2

65.21.18.51:45580

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1560-123-0x0000000000230000-0x0000000000282000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections