General

  • Target

    752-141-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    238355bc7c98cf5903d28201582bbc2f

  • SHA1

    66d76d5b772cb6ff99535a060f99f5e71aff9588

  • SHA256

    239aa9d7f63a9f878244a202003ad50948a39b35f4cbf54300f1e0ab24f5fa36

  • SHA512

    dbb756f1a67869cb2319c82c6bd2f4375d350728f76ac717e299b9846c7489ff58d66e7347a143c6d3de25c415e9b52b51924c70bb8d3df45df66e02cbd84669

  • SSDEEP

    3072:21tDiwyqSVghBGfAGtTjxNKifvWPxnr8e8hy:OibuhM5ZmnPxnr

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 752-141-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections