General

  • Target

    3400-452-0x0000000000770000-0x00000000007C2000-memory.dmp

  • Size

    328KB

  • MD5

    8530b8c3e3eb2aefbc90b1d959c8fc98

  • SHA1

    2362cebf252ec9c24e057de5843c876109593217

  • SHA256

    fb78aa0dc6c9f52f0598db47bc09e629fa485db5aa6e8c287d8d38cd897b675c

  • SHA512

    c6e9d61055fa846944b13e4b0c521f9658afa6c1f7424faa2c3db7781974d4e96088e81767ff15743d8c318a5b1abb4968d0ab7ebc4ab764d1c3071863a495f7

  • SSDEEP

    3072:acZqf7D34kp/0+mA0kywMlQEg85fB1fA0PuTVAtkxzy3RMeqiOL2bBOA:acZqf7DIcnGCQNB1fA0GTV8kU0L

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

eewx

C2

185.81.68.147:1912

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3400-452-0x0000000000770000-0x00000000007C2000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections