General

  • Target

    2168-194-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    f5041f62f985feaedfa10c0c091c20f6

  • SHA1

    eca745eed3208a6c4b58822197ee0f3c6cf5bac8

  • SHA256

    22dfd9eadec0fea9e2a4c63ea670be13c3547dd9591493f61409d114b4746968

  • SHA512

    a67a350a74f166d25755eb056063d9d71013906764c4d5cc3d92799b82dfdf3aaa1c25cd7175d49d96d2b5e53b4f00943252611df9b7fecb81d62941040489dd

  • SSDEEP

    3072:cxqZWo3aWNIUK355stWSet5Frhx3xNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOm:yqZorwArh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@zallllis

C2

45.15.157.136:7429

Attributes
  • auth_value

    819f274cbc0e7c8d89e811e4a9877964

Signatures

Files

  • 2168-194-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections