General

  • Target

    1592-141-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    fb988d469cf929e4c02c0315dc1a9b19

  • SHA1

    5b48113cfedde3abb5bdb9429b78009799558b66

  • SHA256

    1089ff9f0c94dcdc597fc8dce6ccc98f307ca33f0f8ed5108d6ae3866f38c635

  • SHA512

    be42ab98e2d563b54828621f37d89739b5463082120f8dc3e7f5d61b0d770f4559dc5ea5c9dd5178b36ce06af98eaacacf18620fd75fc3daf76ab801f3e3e5c9

  • SSDEEP

    3072:2ytDiwyqSVghBGfAGtTjxNKifvWPxn18e8hy:FibuhM5ZmnPxn1

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-141-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows x86


    Headers

    Sections