General

  • Target

    1692-310-0x0000000000D10000-0x0000000000D38000-memory.dmp

  • Size

    160KB

  • MD5

    9e23ba24932be8c8b492cb977f134074

  • SHA1

    eb22374b2bc41ba3416cb12a8fae2c339514ea4d

  • SHA256

    d940fe37393c097ea8b81817ef7a4c3c7dbbbd5db88bf931aea564cde9bef921

  • SHA512

    db66c55d3ce068df11fb88401d8e0a5fd0e92a318430e71be140032f5cd409bc4f887760f01e49e6d061ff0de1427b358935e8af7748473379ea893cda50fbd9

  • SSDEEP

    3072:4YO/ZMTFNR4vIwr0TEeDO+OPQXVtcDFkRRXDh6SSXo:4YMZMBNR4vIrlO+OIYCBDh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

buildnewdomain

C2

hrabrlonian.xyz:81

Attributes
  • auth_value

    90794203993789d187f29ff50d00de2e

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1692-310-0x0000000000D10000-0x0000000000D38000-memory.dmp
    .exe windows x86


    Headers

    Sections