General

  • Target

    1640-87-0x0000000002300000-0x0000000002344000-memory.dmp

  • Size

    272KB

  • MD5

    3b719d417dbf14f78da0b2685618b2b1

  • SHA1

    5bb16b48041a7124fe9002f9cdbc130c3f80e6e0

  • SHA256

    5a20345635cbbe023ea6ce677e7b395cbaa24e8e6af60efcfd0fdf3eaa428f85

  • SHA512

    675f1f9c265967feba834eebdf0ac77962ed11631adf4ed49891e281a8a38cab2d93c102fe39a5b14d666df469f30d65e93c9b9bb08afd4627e13f4bcc8f256c

  • SSDEEP

    3072:R6j4ELN6FY9CYTk/XesXDCwrsmLoJNT4A1MiYo40KaFpsh0zniVavP6xNn2pU9fv:R6ji0Q/j+wzLoJNT5ME/sh8nN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1640-87-0x0000000002300000-0x0000000002344000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections