General

  • Target

    5056-137-0x0000000000400000-0x0000000000444000-memory.dmp

  • Size

    272KB

  • MD5

    8b8876e6701584d45cfb6d6f7ca711bd

  • SHA1

    41e25aec4e34664761c372746a8c670b262ed5c6

  • SHA256

    0309b22edfb7aec7abde141217fefab0f7c0aebbfbe5e3464c4a79d7667094bc

  • SHA512

    874d7072f4fad5085e49012d416b428979bab8ce555d460442fe3bf918389e873a8c4b245bddd592acfa1147b0fe94a9194a46c7f8b67091d2af0ac875b9efef

  • SSDEEP

    3072:txqZWjHaJIppUZJpM68ImeiE9bhxzPM88g/YfO8JI49RbugQhguaiF:3qZ3ZJpDH5bh5kg/8eb

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Zhannet

C2

109.107.191.169:34067

Attributes
  • auth_value

    cbbb687b4d3fbd2e8e326586352fc821

Signatures

Files

  • 5056-137-0x0000000000400000-0x0000000000444000-memory.dmp
    .exe windows x86


    Headers

    Sections