General

  • Target

    5020-162-0x0000000000700000-0x0000000000732000-memory.dmp

  • Size

    200KB

  • MD5

    bc6847a234a37bd5408565d96a9f2a9b

  • SHA1

    74787bcc4054925d5c0954ca0c7a8a20e4be1719

  • SHA256

    f5a9c681162d8c1df5862b40d7167583bc02cb098566101e464f9b6be772f78a

  • SHA512

    2de17d36016dd4d6d5f0dcb380ea299ff11f71a7ecbbd859d1efa69b5ed5420cfe1625708473a24125046e285c4c422ea0974c7436c4453e7b14197a72f4c39b

  • SSDEEP

    3072:DxqZWFFa7E6T8UGen593h+vxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+caK:VqZcUt3h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cr10

C2

176.113.115.17:4132

Attributes
  • auth_value

    0a52a09c70a98bb6612362e5eb8b1d02

Signatures

Files

  • 5020-162-0x0000000000700000-0x0000000000732000-memory.dmp
    .exe windows x86


    Headers

    Sections