General

  • Target

    1236-101-0x0000000000B60000-0x0000000000B80000-memory.dmp

  • Size

    128KB

  • MD5

    f8cc3d028c04d0934423698ab946743e

  • SHA1

    a8235bea413be776847cdde519a88ccb21a1410a

  • SHA256

    5efe812b69536d0dc2f4aa3c7fca816e28c44c45c0a785bdafdc20c690679849

  • SHA512

    be7ad221ada863e545a761905f191eb89fa4db4e87379c482f98d636cc90a035f1480ec590e349fd525150f3cd27c0036988698e9f5d4fa748bec738c57f2ff6

  • SSDEEP

    3072:DcvFBYCY+piqI+Tg6h4MLkKUQc7b9fDWhB4EASNj:DcvmvI4MoKtcJWhB4jS

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

RuXaRR_GG

C2

insttaller.com:40915

Attributes
  • auth_value

    4a733ff307847db3ee220c11d113a305

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1236-101-0x0000000000B60000-0x0000000000B80000-memory.dmp
    .exe windows x86


    Headers

    Sections