General

  • Target

    5072-791-0x0000000000180000-0x00000000001B2000-memory.dmp

  • Size

    200KB

  • MD5

    86274585a674aeef87e29e2d3c6b35ba

  • SHA1

    04a4923d5f750d02432f145e12da859db44b3f10

  • SHA256

    04d006b75082ceaf4662bddcb91bb5beff3f7689b4322fc7100b23b49ea58949

  • SHA512

    56ac360ef06b774f3f119e9387d886a1a17b1886ef440842ab4587c69b435a54633341dac2a4b3560765d8221353a290c7e2f6f90fa092705d61f879c4adf070

  • SSDEEP

    3072:AxqZWVNaDUSkPMKandeV59lhhvTxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuU:uqZ8MKwClh9

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

ck

C2

176.113.115.17:4132

Attributes
  • auth_value

    7ac4424f89748eae7f5c6a4756d89c28

Signatures

Files

  • 5072-791-0x0000000000180000-0x00000000001B2000-memory.dmp
    .exe windows x86


    Headers

    Sections