General

  • Target

    1260-62-0x0000000000400000-0x000000000041C000-memory.dmp

  • Size

    112KB

  • MD5

    054e28f639942be649d7c5a5b0304186

  • SHA1

    103865329a2992e677835b3fa99ce97eff2034ac

  • SHA256

    c97a34f44a548f1dfedb3689b0a66e92e10f7a5312721e9a30b5bb077225cb87

  • SHA512

    f7c7d89c907709701fdc1c4445eed75b517e5fb4334852c2a9ec75c8169c0865465add415e29f5b59e536d23c48549fa4477c0cd4b1c0b6388c0731e4f5a7376

  • SSDEEP

    1536:K9Jwtp3WKvh3iWVMlmdK9yIVjVGGp4iHwbbr+ADHH+9PKom8lCqkG+/:6JM3iW9d6NmkchTH+9PKom88qkB

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@joker_reborn

C2

20.111.62.187:12944

Attributes
  • auth_value

    3bef5f3e00b75e26d1f1fc60672cd81d

Signatures

Files

  • 1260-62-0x0000000000400000-0x000000000041C000-memory.dmp
    .exe windows x86


    Headers

    Sections