General

  • Target

    1760-87-0x0000000002330000-0x0000000002374000-memory.dmp

  • Size

    272KB

  • MD5

    7fcf91311e5d2098259fee18baab1a01

  • SHA1

    3e2522a941f747a433efe89b5f6e04a4434bef0d

  • SHA256

    f69c7692db21f51dd14b2d7a1acb1e542ff1864db39a5f541b7a0aea9235e96e

  • SHA512

    a8cdabef1b3fae794c2116fb677b6243835bbc03eb2d5b8d0179a4b924ddee9f09b8b9d0aa34a905cd460e2b234282de8ff61d4f8d0539c9fb1c455ef7a0d767

  • SSDEEP

    3072:R6j4ELN6FY9CYTk/XesXDCwrsmLoJNT4A1MiYo40KaFpsh0zniVavP6xNn2pU9fv:R6ji0Q/j+wzLoJNT5ME/sh8nN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romka

C2

193.233.20.11:4131

Attributes
  • auth_value

    fcbb3247051f5290e8ac5b1a841af67b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1760-87-0x0000000002330000-0x0000000002374000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections