General

  • Target

    1564-55-0x0000000002260000-0x00000000022A4000-memory.dmp

  • Size

    272KB

  • MD5

    5054c62217ddd1c647e55ce6679b0c52

  • SHA1

    4f0aaeca8adabbd46e7506feff7641cdeb16ad4b

  • SHA256

    52508ff4a49cce55b94b42dbc772e89d6f68ffe703f287babd5bf6926d3ffbf8

  • SHA512

    8a2d65e031cd1fc0492ebb7a7a98cee6427b4ac4b97de6bb34e78caf186ee19670c71212bf6546060aac00707e7a3f5c0ec1daa8ffe27aff6c9b1a47e04120f0

  • SSDEEP

    3072:16jIELf6FDTCalB9M41vigXM+wXnMvLH9tho40BEl/hUinBTfTxNn2pU9f2MKTVu:16jo9TxpM+wXnMvLHR/hVnB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

roma

C2

193.233.20.7:4131

Attributes
  • auth_value

    f099c2cf92834dbc554a94e1456cf576

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1564-55-0x0000000002260000-0x00000000022A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections