General

  • Target

    1960-58-0x00000000000C0000-0x00000000000DC000-memory.dmp

  • Size

    112KB

  • MD5

    c4f62b9454a6dfc963fb8d9dda8cbbb8

  • SHA1

    d676e9fe7053d0e395e17e477718e8c3244db3ee

  • SHA256

    5d81a30745e94decb8bc9fa1cc2f2536a6c1927b7c67832fa0e5bc3cd725f36b

  • SHA512

    6803e224c32d8539c67c03b572af05aa134d4411270920362fbd384a1b7aeb7eb51e4b59d89eb940057c5a27dc822f33f6eefdf9db001c307e718f528641e0e6

  • SSDEEP

    1536:6PqUPY5oyWjddJg3d3ubDd4ye2DNeDNXNDqDNaiuBjyC4DN1DvyDNPqAJ7W7cMy7:druZehOqJiAZJl9Ng1TP31I

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyllkal.11.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    993a169a4a695e30b763f440765b0926

Signatures

Files

  • 1960-58-0x00000000000C0000-0x00000000000DC000-memory.dmp
    .exe windows x86


    Headers

    Sections