General

  • Target

    1192-154-0x0000000000CC0000-0x0000000000D04000-memory.dmp

  • Size

    272KB

  • MD5

    9203e75ca7ba0585716b4356f736e3a8

  • SHA1

    95d9627b21ef3d12d2f4c94381183fc4e8e735d8

  • SHA256

    fab35f86d73281a45a974c5241efacc1b96d0c50fa44c21fc08fb32819ed70d2

  • SHA512

    dcc1068b742265b6e0e4e4bc14343de2d7f1a86efefcd159460636999f2184bf3130208bb0b229be0894c32f34b594cb53fe8d6b5b689822acc715b759bee55f

  • SSDEEP

    3072:R6j4ELN6FY9CYTk/XesXDCwrsmLoJNT4A1MiYo40KaFpsh0zniVavP6xNn2pU9fv:R6ji0Q/j+wzLoJNT5ME/sh8nN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1192-154-0x0000000000CC0000-0x0000000000D04000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections