General

  • Target

    2028-59-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    f08880daea55f5dafaee15d6e9a4e751

  • SHA1

    769ce96c5d7f4b329f7d84647f24dc24c38bdf33

  • SHA256

    7c1879aef145414baae5c6996d2b1dbd0c4230ffad75ddb2d8600962120a2194

  • SHA512

    027470da44623b8829f7d522c27483f9497a9b8479916adca93548cb7cbc93d64ffc5e8394634908855fd6f08838d5984aa24c8f59683366a4549fd5e227eb13

  • SSDEEP

    3072:mxqZWfba4QwG7wXgeF59hhTnxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+c:MqZHIRhh

Malware Config

Extracted

Family

redline

Botnet

@rozebalpedistall

C2

185.244.182.218:2027

Attributes
  • auth_value

    be1d24f4fbd185a6c652470a30ff75b2

Signatures

Files

  • 2028-59-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections