General

  • Target

    1448-110-0x0000000000CC0000-0x0000000000D04000-memory.dmp

  • Size

    272KB

  • MD5

    49af222f3c69b836287007af9c2bfccb

  • SHA1

    c69bf6cd256440bda4dad614cd1f3165a69a3704

  • SHA256

    dbd7d619d97303281c2db4497f8af9b6d66cf2b34041c18683eac9077159773e

  • SHA512

    a35e9c298b4903ccca23df2e2ff62c60f6e36582545b79381b91afd0a0cfcd026b13284a1206bdae9ddc1eacd484c3ffd287f7c0bb8110a53834f7f9083583f6

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2w:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1448-110-0x0000000000CC0000-0x0000000000D04000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections