General

  • Target

    1048-1437-0x0000000000B90000-0x0000000000BB8000-memory.dmp

  • Size

    160KB

  • MD5

    3d18b4d200f51271107661e04cb5d8b5

  • SHA1

    e48a402c69eb41acb8158323cccb5a4861a4e3bb

  • SHA256

    fd61e3df3287d9197e692d6df9fca5a72f9e693ab80fa6a76fecd87d998e00f4

  • SHA512

    4f237c85eb48dc992ddfbceb8dfc7319fd38849734aa1d0d2aa5128166fed886e003fe0a6c0b1c5cfe91b4ef6cec08e5cbd1b078f7f71a6742df357c90cb4cff

  • SSDEEP

    3072:wYO/ZMTFNR4vIwr0TEeDO+OPQXVtcDFkRRXDh6SSvo:wYMZMBNR4vIrlO+OIYCBDh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

buildnewdomain

C2

hrabrlonian.xyz:81

Attributes
  • auth_value

    90794203993789d187f29ff50d00de2e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1048-1437-0x0000000000B90000-0x0000000000BB8000-memory.dmp
    .exe windows x86


    Headers

    Sections