General

  • Target

    1632-128-0x00000000000D0000-0x00000000000FE000-memory.dmp

  • Size

    184KB

  • MD5

    dd22943cf25bafe9985dacb1d07587f7

  • SHA1

    564e19be17e720aa8fa9c124e10137befc581d39

  • SHA256

    81b4f2b628f39bd2d8fde3b7557f50542c830159411763bb4cd4736fa5959be2

  • SHA512

    879fce46e4ebdcbd888e88d0c2534bd5f9bee63444b4d6a1bf4f94a8a1299b217dcf85e8d3b88d49ae2c558a734e92f9990dee26dcb25f1d94896e447353018a

  • SSDEEP

    3072:LYnRcd8WYqjkrGqViofy0hGVCpW8e8hL:LYnRxqgipiGVCpW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1632-128-0x00000000000D0000-0x00000000000FE000-memory.dmp
    .exe windows x86


    Headers

    Sections