General

  • Target

    1624-348-0x0000000000DD0000-0x0000000000E0E000-memory.dmp

  • Size

    248KB

  • MD5

    518cbf0f134a4b48d70ff9c6c0bdc199

  • SHA1

    fd64f87bd06014ae3ca9bd13f6973a7c2b638ee1

  • SHA256

    1a6ec93948e62994800d3196fc1ea8e511e371ecea0704539b9a8e0df232d17a

  • SHA512

    c2a640d7b8208ae26036162fa4364086aa0b902ce6a372473b1d6bebbe2a17888babd9feba1a19e0cd3f58dd4b6e7673938893b9901addea533279d2c7fee144

  • SSDEEP

    3072:LihvLpYnXNgc+jZ44OLqNaKe/Gbt/q6ubZovTqpwUybFhyM:L+lYXNgc+144OLquOZ/CZovTqHybFh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1624-348-0x0000000000DD0000-0x0000000000E0E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections