General

  • Target

    1412-203-0x0000000000900000-0x0000000000932000-memory.dmp

  • Size

    200KB

  • MD5

    f611260afd0227f566805b24df0cf40e

  • SHA1

    620dd9121d0f669eee27ca8b6574e3ecbe415833

  • SHA256

    9da4dc6bda0570d35f62d076a95fe8741e362889c918bfa54185502ec095d69f

  • SHA512

    69906fed1e14ee718bf27f8af00fcb416fc0df312bb8c32faaf7fa1be8073f78f332f1d49bc4c53c364c915d2f2b94ffaea6b28f533ebec481145b53d72a1064

  • SSDEEP

    3072:mxqZWjHaJIppUsqT9U6eE5iKh6bxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOu/:MqZ3sqTGZKh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

nocrypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    4fc7cda1ab5883a6197f20f517ce2a8c

Signatures

Files

  • 1412-203-0x0000000000900000-0x0000000000932000-memory.dmp
    .exe windows x86


    Headers

    Sections