General

  • Target

    1968-206-0x00000000000D0000-0x0000000000102000-memory.dmp

  • Size

    200KB

  • MD5

    85e6d495a4d868f2356e743649c1448b

  • SHA1

    31197f2ad17d45bd39ba5efba798e96debce8cb1

  • SHA256

    6fe7d9e609c8bff050e24227e1ad06cc5734e8d47d7fd0430b61d3b75280d5b9

  • SHA512

    f8932fc44f7cbfd335d98f0ba9632e327c9899cba1c615c5700238bc4887074c53c8348d61a47bcbce31afd66c9b3fda1d6209e6c806d0496705afea59738b60

  • SSDEEP

    3072:yxqZWFFa7E6T8mAje3595hUexNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+ct:gqZc1q5h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cr10n

C2

176.113.115.17:4132

Attributes
  • auth_value

    6016c19179aa1044c369adb0ec1f363b

Signatures

Files

  • 1968-206-0x00000000000D0000-0x0000000000102000-memory.dmp
    .exe windows x86


    Headers

    Sections