General

  • Target

    1064-62-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    dd8f6ed5495cc35c4b621ede0405bbbb

  • SHA1

    784c2d73138c2149a44795fd6a5818fedcfafc7b

  • SHA256

    f17283becebd6066da46ef4081eec6505d5c4bd44e1d1ef58a2ccf5a1b6e90cf

  • SHA512

    e061196472ec3284eef4155c8bccb0138b4c7dd972191c48e73b160c79968dc2de49ea483a48cfa741c83217cd0df6fa55eddacf8f792f3161a74b5f8507e7db

  • SSDEEP

    1536:uvZi55zWazDfjlo919ECpTJTcF0ZE5GWIvoUJbu3zZgYFK0wuei+gnYc4:uxqZWWFa7E6T8D5dIvjeN5FKh+

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

5555

C2

167.235.141.81:36255

Attributes
  • auth_value

    842c595ff01a0b4b161f122d875170f5

Signatures

Files

  • 1064-62-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections