General

  • Target

    149912-56-0x00000000000B0000-0x00000000000CC000-memory.dmp

  • Size

    112KB

  • MD5

    86bdba29c81f4d84d2a70bfc9f54c9ec

  • SHA1

    06a736e7d911fd55e4d7ef58558a203a86246486

  • SHA256

    39c5b472b8009e37fe87840b5b6deb260be360dcf6481bc24554095ad559495f

  • SHA512

    a425b7201dbc191f93025875a4b7292b864fffb6a5efb84587839421ddfff24312c86c9d77ac5f0fbb5b38446c09bc04b15b25cfbf8205e239996333e10a7262

  • SSDEEP

    1536:7lJwtI6WKsh0n8nBkmC99oV/5Na2I7wgbr+AOosn3/zllhkELQGqZu:hJ90n8BkvaJ4jhOTn3/zllhvLQFc

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@unomaster

C2

185.209.22.35:43054

Attributes
  • auth_value

    2faef8d6172def9f0e100ad3c4e148ff

Signatures

Files

  • 149912-56-0x00000000000B0000-0x00000000000CC000-memory.dmp
    .exe windows x86


    Headers

    Sections