General

  • Target

    1060-183-0x0000000002190000-0x00000000021C4000-memory.dmp

  • Size

    208KB

  • MD5

    1e377387d06a3636466dfbd649ac91e2

  • SHA1

    8dbc9e69a60e1c14d84ea10f4f6ebde705b40039

  • SHA256

    4def89d649dc96743488223f460c56587cf9e882463381c1d619918a4508556c

  • SHA512

    cd026a0a5a59f73c9ac9d2b6c3b5334f13faed6e0a6d346417e168f5292c54aed75560589c186ed6606e68eaa3acfa2fae80ea0e996f4fc60f779aa301407a5e

  • SSDEEP

    3072:KugHUdvRR3ilYpeUk+O8vc4VBY5PqOlqoqqqqqqquqqqqqqqqqqqqq6qqqqqqqqp:5cUH4Y28vc4W6bh44huav

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruzki 10

C2

185.106.92.235:12654

Attributes
  • auth_value

    bd55c8a28ef77f4992002099164ebe01

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1060-183-0x0000000002190000-0x00000000021C4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections