General

  • Target

    4048-777-0x0000000002630000-0x0000000002674000-memory.dmp

  • Size

    272KB

  • MD5

    cd6ed5811e251ebee2b07f1ce0c0a1fa

  • SHA1

    374e825f4953d02d4011e6a2ff0c34f7f2bd782f

  • SHA256

    4334f3178ee12eb5859de739a8d8bcd22d6504c99f7787d8c114e312815ff418

  • SHA512

    c9e927824ebb25f77e8afc920ca31eec6aabff4bee2da670baaa98792d453ec117eb470ff247b9d8a085da0677e15ccbf3ad3a2fd450f447792a8203f4e44788

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4048-777-0x0000000002630000-0x0000000002674000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections