General

  • Target

    4940-155-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    578f6200036fd521e3b1dbba5e4c427c

  • SHA1

    23e15facb27f558e6bc42180191c569a7de201f3

  • SHA256

    e61517e09fec4bdfa981adc1979220c53a9031382c1e04ed0c3090d70e915487

  • SHA512

    4d250e987c57595038003419b508629d3174dae52bb3ed658bddd8769b21f2a6b4d3bfd230dfd651f46bbd8a9cfeb95d63ac410275ac130fd7afc9c96911d790

  • SSDEEP

    3072:+YO/ZMTFZFoI4T1pm0bWpy5wkVeDF5yRP9h7SSYe:+YMZMBZFoIO80bWo5w1ep9h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Eunewdomain2

C2

hrabrlonian.xyz:81

Attributes
  • auth_value

    ec2b750e0ee7d2701fd60bcc6315389b

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 4940-155-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections