General

  • Target

    2980-375-0x0000000000700000-0x0000000000728000-memory.dmp

  • Size

    160KB

  • MD5

    1dee3e98945cbcf50d372885a6f98552

  • SHA1

    9272fdff06436e48b7b32ca4d387f96ccc72d9be

  • SHA256

    1845df0db9002aad9789dd0724fb4c4cb15d1574ff95586bce529f47a3465427

  • SHA512

    9038c4e81ca863b675f1028dc6d1f2cd159481ba498712edd773e5ef252ca932a93cdddbcc058b0749352fe767da2ed53bc1ec25222456175fa56f2c25fa5a37

  • SSDEEP

    3072:HYO/ZMTFNR4vIwr0TEeDO+OPQXVtcDFkRRXDh6SSUo:HYMZMBNR4vIrlO+OIYCBDh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

buildnewdomain

C2

hrabrlonian.xyz:81

Attributes
  • auth_value

    90794203993789d187f29ff50d00de2e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2980-375-0x0000000000700000-0x0000000000728000-memory.dmp
    .exe windows x86


    Headers

    Sections