General

  • Target

    1640-55-0x0000000000090000-0x00000000000C2000-memory.dmp

  • Size

    200KB

  • MD5

    16a4576a06b527d472e3528192d34528

  • SHA1

    79efe6dbf17f83662e06b7d3f603146217b47110

  • SHA256

    afa7395a4f437bc25b426902f98667f0ddf6e944cda01a608a58ebfd6c59e9b8

  • SHA512

    bbb98b099f31ec016ee6a48e102a0120061ec447a42e8a85312234a637c29035bfe4986bb6d245902d267b0938fecf690575f3242bb4e187873aa305ab652dac

  • SSDEEP

    3072:KxqZWXTaQAYO79Y1spSeD594heuxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOue:4qZv9YGT4h

Malware Config

Extracted

Family

redline

Botnet

@rozebalpedistall_

C2

185.244.182.218:45352

Attributes
  • auth_value

    8c6cf9d01323bf91da42de702ac3ade5

Signatures

Files

  • 1640-55-0x0000000000090000-0x00000000000C2000-memory.dmp
    .exe windows x86


    Headers

    Sections