General

  • Target

    1184-56-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    15ff287b62cd32913766f057b1993461

  • SHA1

    6a7a7d337e9f88f2c087611c7ed18fdd3da44768

  • SHA256

    056d2b04655b7cc5f7990f3d23769dd6daa30abb1828ee3e75d8f1a5a6768374

  • SHA512

    288d4a78dd75bbdc5c844fee4e374ddf148f2b24e7fe1c7324f65ccf3d56b907cb41de475e1be5f1d546c18692552474cb6e66e102a91a0c4d073133ef79fb03

  • SSDEEP

    3072:5xqZWGyaEIr+WV5FYMuer5FDhLSxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOui:rqZLV52QDh

Malware Config

Extracted

Family

redline

Botnet

@gennadiy_mudazvonov1

C2

82.115.223.236:26393

Attributes
  • auth_value

    6bda425a78ff4c6e5a0e1be9d395ecce

Signatures

Files

  • 1184-56-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections