General

  • Target

    2044-110-0x0000000002430000-0x0000000002474000-memory.dmp

  • Size

    272KB

  • MD5

    a0f664baa18e11d790d56f525d7d77ad

  • SHA1

    91974a446282debb5680c821479519d79f5a5202

  • SHA256

    d7ecac6a17107c07ec1de072d56ad9c7f8b663c1ef849b8c1f47009a0f119b81

  • SHA512

    3bc8cdb6767772c1807773c944ef3ad0e6541f581ca5765789430811b3189874b7ef64a5dacb6f0f5b02f911532188335bf0e1253bdbf4164b43d993bf9b4dbe

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2044-110-0x0000000002430000-0x0000000002474000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections