General

  • Target

    1912-110-0x0000000002500000-0x0000000002544000-memory.dmp

  • Size

    272KB

  • MD5

    b089074715567d524e57b14351aa9790

  • SHA1

    21b73a867c3ce9fbf094cce04c2d85252918d19f

  • SHA256

    757566f8b2c5c1e748baf5a7048129d7c0d6ceaec4db3ca8b4a3f587d268773b

  • SHA512

    89ae5e08cb5ede7c5e3515c4cdbc037bfacd9052f9cd6076fdad7eefbe014d944b9803e897d25b39df3d1648968bc484489f7a8d53b92942003300a1c080807f

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2H:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1912-110-0x0000000002500000-0x0000000002544000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections