General

  • Target

    2140-139-0x0000000000400000-0x000000000043C000-memory.dmp

  • Size

    240KB

  • MD5

    d09f35d30da3e122bb4e6f307405df97

  • SHA1

    5489619e4f1ec06c18bca556eb097041928f1653

  • SHA256

    400243c453455f7336ecbaf9a9e52dcb7ff9a6dd74711b4c5be368f4eede1852

  • SHA512

    d8b89d53fa68d80d72778bfd1c782147a21de5a2993d881720be7425d18e0c2dc14f99b09cbb6bc266d9e62ba93f6995f0ff7c491b315eb867b0bf8dd2fb3ec3

  • SSDEEP

    3072:KpxqZWD3aWNIUK3CjmTaeCwFhh6vqo4m3OlAMhn2gxmjgDHde8rG9OHPXXzzz:KbqZrCja/hhw1nyJy+PXXzz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

10k

C2

109.107.191.169:34067

Attributes
  • auth_value

    2cb0fc67f1f413ee2838b025c8663c6b

Signatures

Files

  • 2140-139-0x0000000000400000-0x000000000043C000-memory.dmp
    .exe windows x86


    Headers

    Sections