General

  • Target

    636-691-0x0000000000EE0000-0x0000000000F1E000-memory.dmp

  • Size

    248KB

  • MD5

    4acf9e27d34cbad9180857904caf8d9a

  • SHA1

    22e493dbc85fbc9e9e60ecfdc56e2e9cd50dccc3

  • SHA256

    22b99361f47f2965037a6d85b4abcd21da3c95096271dbff80a55012b2b80448

  • SHA512

    8d6bec1553e693812758816c077287044c7b5eea028c03ff2ba521ada079bd64cf20aa35a4e38eb10812eb7de69f411bb4b6ca863fbbda5883b8b9ff5600b1a5

  • SSDEEP

    3072:RihvLpYnXNgc+jZ44OLqNaKe/Gbt/q6ubZovTqpwUybFhyx:R+lYXNgc+144OLquOZ/CZovTqHybFh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

grome

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 636-691-0x0000000000EE0000-0x0000000000F1E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections