General

  • Target

    2996-137-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    34691e1bc03b150c751c959aeeec7156

  • SHA1

    c6bfbe25cf4da98f50b84c2f7a426902b3ad4275

  • SHA256

    0e358788ac3ad1bfa187a710715128130764cd7443ab1c2b6d378b5655f431c6

  • SHA512

    40380be0801516717da2f1dbec58d2e20d225205e37a01636e7ff56b9324d00338d7aa8770afce98a08e3c66997f4b8958b431075e0a9700490a5df281177ee7

  • SSDEEP

    3072:bxqZWkCBLanUH4ik/WAeJ5FIh+7xNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuk:tqZsk/8Ih

Malware Config

Extracted

Family

redline

Botnet

@rozebalpedistall_1

C2

185.244.182.218:2027

Attributes
  • auth_value

    b34cb15a06c902abff71b11247c63ad9

Signatures

Files

  • 2996-137-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections