General

  • Target

    3776-508-0x0000000000CA0000-0x0000000000CF0000-memory.dmp

  • Size

    320KB

  • MD5

    ae1a7299763a361358d510d719f8d048

  • SHA1

    0dfcdb8da7dc96434d8743cc0853ea54b45857e1

  • SHA256

    72f7118f17d244571e2d2a1ca36c5307b5cf972ae58f4e5d6c7d78c4a949a25c

  • SHA512

    0131c0a15550003632115ede52abd79ba2c0d5e95aa217f07fe79a66ed3feb24afb132bc8475690774f26b5a5ec0c23aa21db68ccec1ad10f2d500904d41761f

  • SSDEEP

    3072:0qFFrqwIOG/Zyzca1p8oT4ipvJYThdNS8TZ0fHIKcZqf7D34deqiOLCbBO9:fBIOG6h4Pdg8TZibcZqf7DInL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1307newbild

C2

185.215.113.67:40960

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3776-508-0x0000000000CA0000-0x0000000000CF0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections