General

  • Target

    1356-210-0x0000000000FA0000-0x0000000000FD2000-memory.dmp

  • Size

    200KB

  • MD5

    c1a6bde8fe74ca7ca795577c0ff0b64a

  • SHA1

    e3c89e0c25a8b74325a331164423ce8c66b71e64

  • SHA256

    896156bd49193ece988f55a597b153937e696d548d325ddc110e6cd210224995

  • SHA512

    431e9fa4e7e92fc21fbb8f1acd612e4529bcb69db16da38ddc9d9dbeeba580f1b700575d974cccf5b1d30957439fe5f816dd6613846fdc16987d947f1d5cadd0

  • SSDEEP

    3072:1xqZWFFa7E6T8mAje3595hUxxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+ct:/qZc1q5h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cr10n

C2

176.113.115.17:4132

Attributes
  • auth_value

    6016c19179aa1044c369adb0ec1f363b

Signatures

Files

  • 1356-210-0x0000000000FA0000-0x0000000000FD2000-memory.dmp
    .exe windows x86


    Headers

    Sections