General

  • Target

    1936-110-0x00000000028E0000-0x0000000002924000-memory.dmp

  • Size

    272KB

  • MD5

    fd6fca6c633c116255c9fe90cd75628b

  • SHA1

    89550774d7d1ed5ef9b443596f08d655c0f0c5c0

  • SHA256

    d2ab8515372535e27cd7b89fc40efd3939d5bb21b3771bd0a9bcc7ce549ec73f

  • SHA512

    62287b6514134f69275c87ecd5254254cc8bdf3146f7b77c9966dff76eb00fbc734c194d5dc126ca97c769b0fa9a3ace8b85a01218fe5834cd52496237dd42bb

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1936-110-0x00000000028E0000-0x0000000002924000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections