General

  • Target

    432-66-0x0000000000400000-0x0000000000436000-memory.dmp

  • Size

    216KB

  • MD5

    8ce72ee9b49712bbdab75e74d5ce1dfe

  • SHA1

    32f9ac77b364695f6096deacb054ade74a1a48f0

  • SHA256

    832f59072950d4318b4ab5c5094ad7a2e772985aed4bcdf49eb7d5a5ec877e5a

  • SHA512

    d21494a64c2b4baad759dfab1c58a66de5e1253899b594ea3694963a593b3fcee73abc3756da32a6f6630a8756dcc3f915857fbab7c21f3cb98d6a2325a20488

  • SSDEEP

    1536:HYWYo/ha+BJrDKuI7/+mvSBvZnvwhKYEeUHbXEe5gylDpzurKt:6F+vE/vvCvZnQKf70WVBN

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

10.10.2022

C2

65.21.9.53:38910

Attributes
  • auth_value

    077bd9da8f1046af12c2ca382df58370

Signatures

Files

  • 432-66-0x0000000000400000-0x0000000000436000-memory.dmp
    .exe windows x86


    Headers

    Sections