General

  • Target

    1972-141-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    846f5e69d7d63b7a1241a60dc21efc0a

  • SHA1

    aff410b5d2e5e4088c43146ad6b7e0d8f97ce633

  • SHA256

    050d6ef8e219fdc602415d0719a1f9b04bc9609717b78c402bfa423251628fac

  • SHA512

    d07032e26e115b5b1af172df66e372f15d0f767eed76f7336e2a9a8c7ffcdb31477c1a54f498586a9a34292c4f5b592e3ed6e96efa0e5cac93f4e134e8738e3c

  • SSDEEP

    3072:2rtDiwyqSVghBGfAGtTjxNKifvWPxnZ8e8hy:UibuhM5ZmnPxnZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1972-141-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections