General

  • Target

    1636-196-0x0000000000880000-0x00000000008B2000-memory.dmp

  • Size

    200KB

  • MD5

    f3d6b292ae7ddd1890bd2b6e2f0d1949

  • SHA1

    b46672a8234fe5102d47ad97b9952f442d66a6e4

  • SHA256

    36e41c35db97a69dc6c5795ce20346e347b224329b66f4e1974aaef5b3f9d3dd

  • SHA512

    a66eba9e40fd0fdb841af39f8838f32b038f5ea3e0d4bab9ee0b7591ffb3c03c6ec6d518ff64d7e4b3450e7f301343cd4e17c42a07604b39108e9cbf602e6a0b

  • SSDEEP

    3072:6xqZWZRanU2n04Mi+BYeF9FvhLbxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOus:oqZg41U1vh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

LVH2

C2

70.36.106.161:10456

Attributes
  • auth_value

    9ea6953ac0aefa4f612b65f2d391a27e

Signatures

Files

  • 1636-196-0x0000000000880000-0x00000000008B2000-memory.dmp
    .exe windows x86


    Headers

    Sections