General

  • Target

    528-101-0x0000000004BE0000-0x0000000004C24000-memory.dmp

  • Size

    272KB

  • MD5

    5552a688d005ca6fc2b347e991b7f05b

  • SHA1

    fc14242f8a4626b03a9ecc3481f83913d00e3766

  • SHA256

    4c043fa3d908b7a1bdfc091920e279b92c8f032def449a88a0211f65f8d59a83

  • SHA512

    d96b93f86aac8a8b71828c83b0f3faf928ce27607d1b585d70749feadeeec51acefb651b653be9615bc5a95c2664637fb4710616c1dbfe38f4bfe9eca0e23d2d

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wi9:B6jodYx9cYKpzwAAh3nzZi

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 528-101-0x0000000004BE0000-0x0000000004C24000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections