General

  • Target

    1496-61-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    37fd5774cf0e81fc99e68d538f71e798

  • SHA1

    1584423fa3c2b783316f43a8c2247e75b8edf739

  • SHA256

    b9a5e90f74f8c77db6a16a4aabf982571ac986c185614903d1c9fc41d9a1db82

  • SHA512

    f39b2550227ff63589295eea25b3feb89ca60c0d1b5b01b8571520c5641d578d543ab1cddd7721d18d6610bb24dfd5f2ad1229c1d7e511ebc5b1ed76e62b9e5e

  • SSDEEP

    1536:FvZi55zWaaDfjDo9djgCpXWRFSkWxzepm2m8eq6VJbu3zD8YFi0wuei+mnYcQ:FxqZWfja1ggWPixzQm2m8Ce3VFihY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

1212

C2

185.87.50.249:21171

Attributes
  • auth_value

    050894898427474204e9e94f9ed7633b

Signatures

Files

  • 1496-61-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections