General

  • Target

    1440-208-0x0000000000380000-0x00000000003B2000-memory.dmp

  • Size

    200KB

  • MD5

    7e0b2bdec8d38fb6ad28459f43cecc6b

  • SHA1

    cae05edea19f2afc6c42a328d87eb2624a0ea601

  • SHA256

    e276d6e6328b57589d64880364acd1de52c22f109662051def8bde6f53223880

  • SHA512

    70f6ae22bd52c79cc2b2d55fbfe83a8874f37bfea9cd691bf50c4e9af5b5b8c790034504f62582dbd6e977b03e7af31901869785c155ebaa4c41b7daed41c5e5

  • SSDEEP

    3072:sxqZWFFa7E6T8mAje3595hUXxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+ct:CqZc1q5h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cr10n

C2

176.113.115.17:4132

Attributes
  • auth_value

    6016c19179aa1044c369adb0ec1f363b

Signatures

Files

  • 1440-208-0x0000000000380000-0x00000000003B2000-memory.dmp
    .exe windows x86


    Headers

    Sections