General

  • Target

    1624-127-0x0000000000090000-0x00000000000BE000-memory.dmp

  • Size

    184KB

  • MD5

    e0b20accc38f0bd694bc4f27ca10765e

  • SHA1

    c2df6bc8cf77bb4dad54888d7fb8fe5b45f05620

  • SHA256

    705b7a5a9388461a822b5c75bf84f114427d045c221a3b931f3e863eb73f3386

  • SHA512

    eae629d97479a21f3cd40c3e10f18130bb0259084556f7aaf7b7702379035b220a0906817fc9e0de71c451f1d9d30de032f047e98b8e7766b377273b6cb2d8ed

  • SSDEEP

    3072:XYnRcd8WYqjkrGqViofy0hGVCpy8e8hL:XYnRxqgipiGVCpy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1624-127-0x0000000000090000-0x00000000000BE000-memory.dmp
    .exe windows x86


    Headers

    Sections