General

  • Target

    2080-181-0x0000000000400000-0x0000000000436000-memory.dmp

  • Size

    216KB

  • MD5

    ede9f1cd464e5497d1429a2e791de387

  • SHA1

    9a8bdac360b1ab757372f0187ad31c560281bc78

  • SHA256

    a91136f44dea193eeb3285f128633c316ecb0dcd1364a13b4740af65680c8d75

  • SHA512

    d4003c0c29501b92481c7612c0bf55f27f685a73e2aa2f96d9e37a5470fff30e4320bfd57c9c6fa51098df68b1aee7ace9cec61c9b4ea812fa51e0a0dfafce2b

  • SSDEEP

    1536:tYfvqcgwfurchjb1w+yv59vonHPb/yge50bXEeTgyNvpzurttUadOUw1y/pbYY34:KUwHzwTv7vonD/8M0oV1WUkrhpPGL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

535

C2

45.15.156.26:2794

Attributes
  • auth_value

    e7680eed1ef96d61de0f4c54c7c5a594

Signatures

Files

  • 2080-181-0x0000000000400000-0x0000000000436000-memory.dmp
    .exe windows x86


    Headers

    Sections