General

  • Target

    4492-185-0x0000000000600000-0x0000000000632000-memory.dmp

  • Size

    200KB

  • MD5

    04bc9186c3b258fe84785b73c7b09a3d

  • SHA1

    0635bc3ddd57b8a84c41be5d37f4757287d0d587

  • SHA256

    ef621b4bf0fecb044198f212622b217e767447b45fbfe69e586e08f1188d325d

  • SHA512

    c42f02de5ebb26fbabd1cdd458f24facc595fd8ecfce6193f230c35f76f12ee0bdc4483cb58e566fdf4d4c1307e44d185203a462742aa0fa48e5f7017580507f

  • SSDEEP

    3072:zxqZWFFa7E6T8UGen593h+/xNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+caK:FqZcUt3h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

cr10

C2

176.113.115.17:4132

Attributes
  • auth_value

    0a52a09c70a98bb6612362e5eb8b1d02

Signatures

Files

  • 4492-185-0x0000000000600000-0x0000000000632000-memory.dmp
    .exe windows x86


    Headers

    Sections