General

  • Target

    2012-55-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    f2034e217e06d490afcf4501021e8072

  • SHA1

    21b093a6f7509821fc09ab5ed23f938efafd6249

  • SHA256

    1cd1b18af047db6e9226515e26b3f36a89a67002383b89b1ee1408d307ee22e4

  • SHA512

    718558bda36ec15929415db7769af1d1d6d3adc79dd5361bef5267e2c013df2454d32da98cc97fe7ef85459446fd6c7095b807c420359f297d2d70dc05a5bafa

  • SSDEEP

    3072:cxqZWXRaekyK1uBnSeJpBeVH9HhwyxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0j9:yqZ7uBnLJp0Hh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

test2

C2

212.8.246.130:18556

Attributes
  • auth_value

    10732ddc6f6596881ede627d97aff9b7

Signatures

Files

  • 2012-55-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections