General

  • Target

    1624-112-0x0000000002560000-0x00000000025A4000-memory.dmp

  • Size

    272KB

  • MD5

    864c5f37e520c0fd5204bbc3c15f16d7

  • SHA1

    06be523bf0f85fcb21aaf91b167b10da072a168d

  • SHA256

    fd9b42d46865dbc1b236a43d05074134b1715d51fb89c2886b729eae30a07a68

  • SHA512

    bb43a0bb01ce4934f2c349989c20cfbf106fc235e742c270266ebb0a77a3e1743996922f47a9dce5d5f7fd1aa62bed85c3fbf01a17b6c5fafd487d0c21b213d9

  • SSDEEP

    3072:R6j4ELN6FY9CYTk/XesXDCwrsmLoJNT4A1MiYo40KaFpsh0zniVavP6xNn2pU9fv:R6ji0Q/j+wzLoJNT5ME/sh8nN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1624-112-0x0000000002560000-0x00000000025A4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections