General

  • Target

    280-110-0x00000000027C0000-0x0000000002804000-memory.dmp

  • Size

    272KB

  • MD5

    5c6cd1c467d5c083071c9cc9946c4952

  • SHA1

    229a999377267a7f585ec6ee8630c30922d7856c

  • SHA256

    ae804dc88db20d9b36707cdfb58930d308059f662c02ccf883512814942eb8ba

  • SHA512

    dee50549704e565a6c675feaee3fd176b9593b55f3cbef2b370d621fc1dfd45f82dde5a501578f930f7428c1ca9fd4a76d7dfc59f4c16d0f33c686cbf1f7e2ec

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 280-110-0x00000000027C0000-0x0000000002804000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections