General

  • Target

    2024-129-0x0000000002300000-0x0000000002344000-memory.dmp

  • Size

    272KB

  • MD5

    cd398de39126135985d90c80a18416e4

  • SHA1

    d6956dc08d793bafd08321214152e03547d9b68a

  • SHA256

    d1e14154708e1454091629383515ee2cd49e3134bb9f264e685c0607fb005414

  • SHA512

    3bdb1838f50c2731d17d208b6e0d080b50d2c43bbce2e97a3525139eaf5719d2b29d56cad5449fc5bc0e83817a6a4c66728170314dcf2bb1d2cdfb31dfbec894

  • SSDEEP

    3072:R6j4ELN6FY9CYTk/XesXDCwrsmLoJNT4A1MiYo40KaFpsh0zniVavP6xNn2pU9fv:R6ji0Q/j+wzLoJNT5ME/sh8nN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2024-129-0x0000000002300000-0x0000000002344000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections