General

  • Target

    2028-61-0x0000000000400000-0x000000000044C000-memory.dmp

  • Size

    304KB

  • MD5

    d9e549698085373662d38b71c07d1f6f

  • SHA1

    f92e1a7de4a1473622b1007ec00d2fca2e846aed

  • SHA256

    ac240be784f6b2ba2be4c9d1c15212df4f7fc8c8d20189e7c6f9cc1db689361b

  • SHA512

    f7325f9d7355d23917a6bb1c9640ce280b604bf0f724b916541ff5d69c89ec76a5edd4527db79d030936b9406e1866bc2c7395a5d77e858489899f75b0df3497

  • SSDEEP

    6144:ZqZOqEORgzhwAi91blbkf++++Ec84pzFTH9B1Xe+GAuoLS/A:ZSOqE+gzWA+bXIj9u+GA3S4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

mojno v rot

C2

79.137.192.41:40084

Attributes
  • auth_value

    0cd15a7512436db6ce132ddeaf3b5aeb

Signatures

Files

  • 2028-61-0x0000000000400000-0x000000000044C000-memory.dmp
    .exe windows x86


    Headers

    Sections