General

  • Target

    1740-197-0x0000000000E80000-0x0000000000EB2000-memory.dmp

  • Size

    200KB

  • MD5

    4845e9b37e2c2e328e107ee2831e82ae

  • SHA1

    0f2057c7a5e075ae614e70090636841a839e6097

  • SHA256

    f1694c4f98ad86657aecc62cfa1258aae02bf7ac9b17144421d3721965bf03c2

  • SHA512

    3e06ae0c063e7e21392525b450882784f324c8301ccbe91adfa827aa79af971a0d16d7e0808ea5399c063b450ee5eaa671f855325a59c977aeb20d593f74f9ce

  • SSDEEP

    3072:MxqZWjHaJIppUsqT9U6eE5iKh6jxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOu/:iqZ3sqTGZKh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nocrypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    4fc7cda1ab5883a6197f20f517ce2a8c

Signatures

Files

  • 1740-197-0x0000000000E80000-0x0000000000EB2000-memory.dmp
    .exe windows x86


    Headers

    Sections