General

  • Target

    484-141-0x0000000000320000-0x0000000000350000-memory.dmp

  • Size

    192KB

  • MD5

    007b445a63cd996970de34b87874a5f9

  • SHA1

    4f69ad781acce385942870e95ce7e67efa12eadf

  • SHA256

    c9c4f50c699d85e040cf3c1102e3a85899597af8ca65a76977e139f06ec1a17d

  • SHA512

    c740d022d9c3fd5a50282efba0b3553db4399e798c3ed9bb2b02386118b2b5d0683b01ea5163b67ba9afdf5b323c3c0368a3147dade1d7d018c1bbe1a7f7a4ac

  • SSDEEP

    3072:2OtDiwyqSVghBGfAGtTjxNKifvWPxnS8e8hy:xibuhM5ZmnPxnS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 484-141-0x0000000000320000-0x0000000000350000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections