General

  • Target

    1308-75-0x0000000002250000-0x0000000002294000-memory.dmp

  • Size

    272KB

  • MD5

    2c735838e5844eae448a88468c5875d8

  • SHA1

    f5ab459e7b0ba4a8098e2a2a3bdfb5aa80a54ec8

  • SHA256

    57b412b0cfb8e1f1ed5b0b7bda6a19e505fd2d7a770b0bd1c051b478a20860c5

  • SHA512

    bb87411ffa2f021d12a42cef6047c417447566a2a462a78500eeefcbc2ee4b1ffdda34e5e3a9fba971df91ca0f992cdd45d5d07084f93f0a1449fa7d3a4e77b6

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1308-75-0x0000000002250000-0x0000000002294000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections