General

  • Target

    1928-113-0x0000000002270000-0x00000000022B4000-memory.dmp

  • Size

    272KB

  • MD5

    c4418cc9136bbbcb68f8655e20701592

  • SHA1

    15ae922937a16beb98076f716e7397d67c30aa12

  • SHA256

    4355d6fc705c1830cb4a6af9f1a509ef2e748b1d741b13b7c2740cf2f07bc609

  • SHA512

    fd55bdb51c1a023ba1b49c1878b60383dbdd7b9cd4a54dbb4d0d8256199c5399ea62542dc9ecb7a4101c514e727032f80af853826f91953c764a01d8dd0f1c6f

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1928-113-0x0000000002270000-0x00000000022B4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections