General

  • Target

    976-129-0x0000000000EB0000-0x0000000000EF4000-memory.dmp

  • Size

    272KB

  • MD5

    d829c5b2a1e7391eaa705f4f85a59da5

  • SHA1

    d15f3cc38a51faa942057ff5948d66a3c57f69e6

  • SHA256

    69a54a2682e51b07b930200c66eff4e5d46f78ce5f06aba0bfbaf692560d3018

  • SHA512

    11bd343b80e68b66901d558526db7eba65cab63ee85a13a178752bf227436b1edc2326bf6c6c812ba29549a0dea244b04c97de365ece14602e31e3dd6d4c5de9

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wig:B6jodYx9cYKpzwAAh3nz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 976-129-0x0000000000EB0000-0x0000000000EF4000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections