General

  • Target

    4352-1549-0x0000000000500000-0x0000000000528000-memory.dmp

  • Size

    160KB

  • MD5

    567729d6566599c64414ebb153e6ac96

  • SHA1

    549ee6b71ee2c603138069283f8a6a757124898a

  • SHA256

    2c1b808f7f552625ea6202b1fc98e0de60eded13e8a9233a27373ef45bda32ad

  • SHA512

    02556cb895d312ec93f1b812b988a1f3dc1d1af0ff65581b02a518ffab899e4075c9f1ec5ac66e4126374f98b9beb5244324df20d42c77a6d8db8b50de859955

  • SSDEEP

    3072:nYO/ZMTFNR4vIwr0TEeDO+OPQXVtcDFkRRXDh6SS0o:nYMZMBNR4vIrlO+OIYCBDh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

buildnewdomain

C2

hrabrlonian.xyz:81

Attributes
  • auth_value

    90794203993789d187f29ff50d00de2e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4352-1549-0x0000000000500000-0x0000000000528000-memory.dmp
    .exe windows x86


    Headers

    Sections