General

  • Target

    436-141-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    c7eeb934ae5302b54addc51e2f1a92c9

  • SHA1

    bb660a73b870fb6851769717ea163c0bd84a5dab

  • SHA256

    9d7c1c87dbe0d9850ca182d05618959f6668740046deb5e07c7511b6513f6fb9

  • SHA512

    5552d81e1bc1d496bb6263e5ef676c84c4a6a5719cad071f1555f0f3cb88e91f1e715d7a901a71649b1f0d4c19380e41a832ef272d86632fda95c5e5e9c5136d

  • SSDEEP

    3072:27tDiwyqSVghBGfAGtTjxNKifvWPxnZ8e8hy:EibuhM5ZmnPxnZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

rovno

C2

83.97.73.130:19061

Attributes
  • auth_value

    88306b072bfae0d9e44ed86a222b439d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 436-141-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections