General

  • Target

    816-110-0x0000000000B40000-0x0000000000B84000-memory.dmp

  • Size

    272KB

  • MD5

    dd7e5ff54c6622c351dbc6949f516e08

  • SHA1

    82d7adbb78617b160d7a220002d186ccc35e6970

  • SHA256

    31a0cb13a72921fbfcc06832b75f10cf036d8a81564aff499fdacd413d5084de

  • SHA512

    869ee689c99d330f63442bbe49273d3134dcec0d06a3a6ee4bab3fc3581fe7c4a0039cdfdec41fffd08559c98ebad0b0581ba4810cf640dcd8c117d897167c1b

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 816-110-0x0000000000B40000-0x0000000000B84000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections