General

  • Target

    1652-102-0x00000000024B0000-0x00000000024F4000-memory.dmp

  • Size

    272KB

  • MD5

    73a7df9e8ccc5ffe342fb119edf15aa6

  • SHA1

    2d7316e18b804a9052b8c663b947ff99606f418b

  • SHA256

    8a3e45f46c89d6b6faa0749e7f6fdc3589e9ed32ea70cf6fba33f7e86e6972bb

  • SHA512

    6548cf14bbb1387b205df052f1498d49a47b2756a20e8fe7d842fb55ca04a4c9d15ead4e6ff477556eadbcddb0fe8c3012b9bae1aaaf93f44ceffe5761e37d19

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2O:p6jgppZsLKwuAexbpZghdnlQH5Q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1652-102-0x00000000024B0000-0x00000000024F4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections