General

  • Target

    1516-75-0x0000000002380000-0x00000000023C4000-memory.dmp

  • Size

    272KB

  • MD5

    3ac75e7c742aff32843dae2d8e1e83b0

  • SHA1

    05359d5df53a6bf9261e8ae0384dfe59d649a895

  • SHA256

    e9296004f65f2d70d88a7a01e2acd0c143fbdbe2bf691cc82c4aa4b1d69e2271

  • SHA512

    1fdac48f9985576163caff0c6fe5458a0bd8f48ba33f2eaa992c743cd2b312d912cd9ae55ac8f89526aa8afce4e159ff8fc67f77d42e41fa2df92d0810817e8e

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1516-75-0x0000000002380000-0x00000000023C4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections