General

  • Target

    696-224-0x0000000000DD0000-0x0000000000E02000-memory.dmp

  • Size

    200KB

  • MD5

    ad7be7199dbc9a8badcd86f006d11010

  • SHA1

    9402f605a1c48214de6d254b499531d1cf749a54

  • SHA256

    fa839cda74bc60b9fa3f209fb562ce6342a3a783f74ecb9d49063f4f0147ceab

  • SHA512

    4e3ae4f4777030881dfa24b7609d47b0d464093b0640900e65ceff5e3ec28006b1e159c1758cee7935eb43711f429a7b95a4104654290c43267889f8d3ed41ec

  • SSDEEP

    3072:mxqZWPTa9ApGvCbyXcLeM5EohiWxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuK:MqZvCbyscoh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Signatures

Files

  • 696-224-0x0000000000DD0000-0x0000000000E02000-memory.dmp
    .exe windows x86


    Headers

    Sections