General

  • Target

    1636-95-0x0000000001090000-0x00000000010B0000-memory.dmp

  • Size

    128KB

  • MD5

    9d764297f7a32a1eaf148cd95b66bbab

  • SHA1

    360db425d304ec33c6a974deedc54bd20a7b5746

  • SHA256

    454541289cde1ba8501da0fc15989d70bb9a0dd7443623ff8dc39c23a5a8730e

  • SHA512

    407baafe891a98dbcb1e11f298790a731c5a39a0d54dd76e8551abeb8f00685c09133b22cfa0b0852118935127971ab236756034abf37a901b73b456fa3c6c2d

  • SSDEEP

    3072:QcvFBYCY+piqI+Tg6h4MLkKUQc7b9fDWhB4EASNb:QcvmvI4MoKtcJWhB4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

RuXaRR_GG

C2

insttaller.com:40915

Attributes
  • auth_value

    4a733ff307847db3ee220c11d113a305

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1636-95-0x0000000001090000-0x00000000010B0000-memory.dmp
    .exe windows x86


    Headers

    Sections