General

  • Target

    1180-109-0x0000000000720000-0x0000000000764000-memory.dmp

  • Size

    272KB

  • MD5

    841b5b2ddfceb463ca3c6ac9334c135a

  • SHA1

    12610947fe88c4ce62dc10b6af8cc94a7b065a1f

  • SHA256

    0e3f9e7f6e85b5b3b870cdae919e60db89d88dba6b272b03ff4e8ab8d6c03cee

  • SHA512

    5e917bac6043bb0bd3ae8b039ec54c93d4d7e5dea83dd770331a37cf35794abf9576014dd045aedd29ceba42719abba252aec1b173f12b48785c5f542bba9823

  • SSDEEP

    3072:p6j4ELH6Vt7CENpmh6sLKR+utY/edHbpiWo40mTJghm0nlQoYKgQmExNn2pU9f2J:p6jgppZsLKwuAexbpZghdnlQH5Qw

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1180-109-0x0000000000720000-0x0000000000764000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections