General

  • Target

    1716-110-0x0000000002330000-0x0000000002374000-memory.dmp

  • Size

    272KB

  • MD5

    5ba51428887db502da11992e69319279

  • SHA1

    0c2cc49d83d641daf152939be85673c3ab5a45d2

  • SHA256

    b348de75cfbb6e8bd8ec24fe31a241517be536dbff5877d1e94e87da4d7beca8

  • SHA512

    b44d17872e603606837dc61815b4b1a1c66623a50ef5c0549a6ac4be11a77f8fd2d44fd2e3208100400541dc65f30cb303f5b93e398a79fdb4dfe7652e117a38

  • SSDEEP

    3072:R6j4ELN6FY9CYTk/XesXDCwrsmLoJNT4A1MiYo40KaFpsh0zniVavP6xNn2pU9fv:R6ji0Q/j+wzLoJNT5ME/sh8nN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1716-110-0x0000000002330000-0x0000000002374000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections