General

  • Target

    1100-55-0x00000000020A0000-0x00000000020CE000-memory.dmp

  • Size

    184KB

  • MD5

    a4580fa81b76d20729854d2ca5e9c86d

  • SHA1

    fd58d952df5a17c6a5535893113a7320874c76a0

  • SHA256

    732507655d26bd273cdaef30c5385c2aa92fd5967eceb14ae068f1928c78097d

  • SHA512

    5cb7034a0665dfe5b080f20a59801cad24b5f00a56dc71ba0e8a6ff186c84ad32d1dbe11225827aa24b343bbc8ff3ebe4dee183cd9516ca2ca7ea82a06db499b

  • SSDEEP

    3072:8ndAnoYRueaFIYkekNa3NSntshh/v6pBl:K7FIYkeD3Ycy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

wickm

C2

wickleymorgan.com:80

Attributes
  • auth_value

    952172493e82b26d564d5b881d83e093

Signatures

Files

  • 1100-55-0x00000000020A0000-0x00000000020CE000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections