General

  • Target

    2040-229-0x0000000000A90000-0x0000000000AC2000-memory.dmp

  • Size

    200KB

  • MD5

    0c464d50825b07a4c42706e7f212b600

  • SHA1

    e64e53f3b697ef6e11ac70ada131de1aa5162ed4

  • SHA256

    caaab0e396ab615ef3526fa394b97dd893e1332c848bdb25ac8440f460ba1b46

  • SHA512

    3f906094dcaa6d068d240e6af17f711bbf6778d3627b4b5237f84dbbc9a8982ee131d016a32f4342446b9ae65512dada9e12cbf143cf94b55fff65eac85f4217

  • SSDEEP

    3072:ixqZWPTa9ApGvCbyXcLeM5EohiyxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuK:QqZvCbyscoh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Signatures

Files

  • 2040-229-0x0000000000A90000-0x0000000000AC2000-memory.dmp
    .exe windows x86


    Headers

    Sections