General

  • Target

    2844-32-0x0000000000E40000-0x0000000000EA6000-memory.dmp

  • Size

    408KB

  • MD5

    ee08eb392502231e30e718aa6ad0b697

  • SHA1

    4c9716d373a307e16baddfb91c3e262eabcc28f4

  • SHA256

    dc51f54ae4e53ef91d1fd66ca191ed7f96902f2f14979ba78afdc27f52d1bcde

  • SHA512

    dfc190648b0da534b6df2b68eb846ae7f609472d10b4068032d38af59f023cf49d66d583793b782b0366f90cd454e603a7052779205db21adf6b51bf0b93f89c

  • SSDEEP

    6144:U1z+MfYo0g0tLvvsRYikddsTuMRqfjD4RL:U1zYoc3A2yTuMs78R

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

OMONLABIN

C2

45.88.91.205:1912

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2844-32-0x0000000000E40000-0x0000000000EA6000-memory.dmp
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections