General

  • Target

    1776-110-0x00000000024C0000-0x0000000002504000-memory.dmp

  • Size

    272KB

  • MD5

    a9c09e547f1e3fa57e7b86d99eacba7e

  • SHA1

    31f5dd55318d34710a2ce5dfdb97cd31822bcc2b

  • SHA256

    a17763667153417f2f14ae0ffb985d6105322ce1384a52bf94b0a1f8255210a0

  • SHA512

    8aea2e5ba33bdaf91185a2446563013617621f029633c7817cb4180e1cae07ce8df96dd3dd7cce0d0e8aca66038d4ddca16b7b7ce2ae3534efcd50578c7b5fd1

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1776-110-0x00000000024C0000-0x0000000002504000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections