General

  • Target

    748-108-0x00000000021B0000-0x00000000021F4000-memory.dmp

  • Size

    272KB

  • MD5

    92f74218e3a4d2f2b38c91e44b310131

  • SHA1

    5e1307810bfde555cdbac45cc245f782aacfed17

  • SHA256

    7380e312b551591625021d4a9a8b8ddc8f806d3a7e3f81adc8bc050fb4f27b75

  • SHA512

    9bbd1b907601f422da3abb68cc55cf7fa22a1d0b72117b783870b9318540adf418b2cf553f93a1f0a3d1abbe80ba3b0691ad22c560e13eb323c373777ac1b8a2

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 748-108-0x00000000021B0000-0x00000000021F4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections