General

  • Target

    528-113-0x00000000024E0000-0x0000000002524000-memory.dmp

  • Size

    272KB

  • MD5

    38f13c3b92e011dfa0a6770170697a8b

  • SHA1

    2c4c1dce978265e56de88c3615aea676a19475e1

  • SHA256

    1da36fd51fc08844e434f73954054ca61667e6d72182533cd1cda7ac19ee4eda

  • SHA512

    3d941d59c719e9d031b4df4adadd9a2192d0e61db15fbfaeadbaea7dff42e20feb36f23d78a14bc15c587f231323ac91b0c93df8dd9e0f8b660b5d8872e6d2d7

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 528-113-0x00000000024E0000-0x0000000002524000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections