General

  • Target

    1884-55-0x00000000048F0000-0x000000000493A000-memory.dmp

  • Size

    296KB

  • MD5

    0cd5b2379669b8723410284c3102b554

  • SHA1

    0729f6aae43bfd17cff41d13d9c319b2f26e54a2

  • SHA256

    487d07663f78e04f4be7a40169f8a6c955bfffc97c4ba9ff31dbd56a8f8cd853

  • SHA512

    b4666a726c00b8f41dc102f01948b5595df7ce4f59201c49374dfe5f1552f77a056d51c9afc2f460aa81267e7c85154f38c6c537591f2fa03ca88a3a165905d7

  • SSDEEP

    3072:OAAmSUAOZDzzNECFw83brM+VWbE3/wGHtmvb6sjzeJ8JH5g4krzpiu6:OzOZ5VFDbrzXAHK4Oz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

doz

C2

193.106.191.21:47242

Attributes
  • auth_value

    0c1f6245fdf34473eba636d447c5c2a3

Signatures

Files

  • 1884-55-0x00000000048F0000-0x000000000493A000-memory.dmp
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections