General

  • Target

    3280-151-0x00000000005C0000-0x00000000005DC000-memory.dmp

  • Size

    112KB

  • MD5

    44abac5ca81eaad98eca9fa819d7ba61

  • SHA1

    c78ec55e5dea0b9bb36f28b834656e31cbf1f3f3

  • SHA256

    36eabe0a0d47ec0db19d1b19f47ae71c29f0fcd2125d28d02085a835323a34ca

  • SHA512

    3ccfad648a6a39cd7c5b2621e7d9b46fa14317a1c545604b4c164386d120529b6f162c79cc04393331aea0e6773852e4c40442644c9a39a56d792049ff0ed0ff

  • SSDEEP

    1536:Z5PqUPY5IyWjddJg3Jf+bD1gq582DNODNPNDCDNyiupjyCoDN1DvKDNPiYJ7G8yZ:i/+hmB+SpCIPq0YAFIZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Lyllkal.17.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    565a9668dd1777de1ee7af85e4df82f6

Signatures

Files

  • 3280-151-0x00000000005C0000-0x00000000005DC000-memory.dmp
    .exe windows x86


    Headers

    Sections