General

  • Target

    1252-93-0x0000000000CC0000-0x0000000000D04000-memory.dmp

  • Size

    272KB

  • MD5

    d2539d256e0d4358f26e3ba576bb74fc

  • SHA1

    26d6b7323b3b44cfb070a82063e94f86fd081a50

  • SHA256

    3913872936254a399045aaf04cac6332017680b99f6cc61a7bc845d234182489

  • SHA512

    9b1f2ba4ce8343787c218cce43a8f2b30ec1afff0cce808917aee69ed9eaf4f8a0babbf2e25f960d9e912598734de47b582d395679de6a3eab4ec14104bdaa0a

  • SSDEEP

    3072:B6jIELf6FDTCLkYxJw6qxYgcgpiiSo40jm8dAhTrnz5XD1NxNn2pU9f2MKTV/wii:B6jodYx9cYKpzwAAh3nzX

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1252-93-0x0000000000CC0000-0x0000000000D04000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections