General

  • Target

    2028-141-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    fb29b8e8f5353c60cdbed0d42e5fe17a

  • SHA1

    a48bc38bdc21b9c28e91126f1aebdaa92e54f3a1

  • SHA256

    14b7c9f453e7999ae7594991f22b1859dd7bef861fb53f79685f167155822b62

  • SHA512

    3bd3b9b9821f912a45faaae7122bb7eead90ee48b1db23d8d99f3f39036c204f7eb1ad89512a19b1eb5e77eeb55a88cddcf1eb0a4fd894f5b8d45366e2f4052e

  • SSDEEP

    3072:2/tDiwyqSVghBGfAGtTjxNKifvWPxnD8e8hy:IibuhM5ZmnPxnD

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-141-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections