General

  • Target

    304-116-0x0000000002280000-0x00000000022C4000-memory.dmp

  • Size

    272KB

  • MD5

    52b3fd1028bcfaa651d4ef4e99eaaa64

  • SHA1

    04d5f1dfb93735e63ab3a2bf0509d8846bd6012d

  • SHA256

    21b0fce8e22bd9c72a51904a29c71aa48b2de25f22948e6405eb9aec0dc8a3b5

  • SHA512

    6a0ee28a92171f2d6f8b448f1cfdea7a88c14a8ad608ff855802324361bc4d15cc6c0c002d928c3e231e9f6b45675fa0a1fb1489ab07c18b3613072575e5c73e

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 304-116-0x0000000002280000-0x00000000022C4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections