General

  • Target

    1272-161-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    ba4672b3a7c53a8a9f6960187af22f15

  • SHA1

    ea2f3bc7c7ad834517a88a5f85617e990609f611

  • SHA256

    030f85ce8533e0336d1cbc6b276f4b61ba6078c9fdbdd01552b1a1c83fbc98cc

  • SHA512

    3c19d22a1d978b3205c537502dae9b045aae0a3476bd94c8a4aa4769966f86bb020766bff0edf49b8de0d99612097f5b6217cd7668a661b14bd5d1986a64670d

  • SSDEEP

    3072:lxqZWfragQx+/1yEWGljSerhFOhXvTxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0J:vqZu1yEWY5Oh/

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cr2

C2

176.113.115.17:4132

Attributes
  • auth_value

    4bf573d6f5ab16f3b5e36da6855dc128

Signatures

Files

  • 1272-161-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections