General

  • Target

    4172-324-0x00000000007A0000-0x00000000007C8000-memory.dmp

  • Size

    160KB

  • MD5

    3d57bb55ec1d7b22612953e342954a6a

  • SHA1

    504c40f082d6b43fab70c9f537af24ef9d24bbd3

  • SHA256

    41728cdbdf5e4ced6a2bd013d0902407b09726cb61b56e6c6a05f3dd108981ca

  • SHA512

    f7aa3aa472b771e51b787f651d362823eb3718f0d5c796fea429c108dfdfe73e78265a5bb1156952f590831f398d9b78d5037a0faa7236ebeb2621b88c463a07

  • SSDEEP

    3072:VYO/ZMTFNR4vIwr0TEeDO+OPQXVtcDFkRRXDh6SSqo:VYMZMBNR4vIrlO+OIYCBDh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

buildnewdomain

C2

hrabrlonian.xyz:81

Attributes
  • auth_value

    90794203993789d187f29ff50d00de2e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4172-324-0x00000000007A0000-0x00000000007C8000-memory.dmp
    .exe windows x86


    Headers

    Sections