General

  • Target

    4052-135-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    20e0a15223ccd03571706d5d62c255f3

  • SHA1

    e64b4530201a95dceebce63c37f6d21b4a8f924b

  • SHA256

    1097dd4d8f8980eff8564de8b45b610d66869cd1c76d27eecd2e33eb2ea0e404

  • SHA512

    9b56b7225f4f85b8654b1a511e86a7eff29dd55dc24255f7789a9f30195097121417f20910ebac94376599ed8f04ac45988e63f324dd1d44853310c8d52295eb

  • SSDEEP

    3072:7xqZWjfaUocqr0FEWGlSJe8SFehXnxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jS:NqZb0FEWYPeh

Malware Config

Extracted

Family

redline

Botnet

@knmgjfydfscxyvvn-CLEAN

C2

89.23.97.112:34068

Attributes
  • auth_value

    52313b0d154c2c4138367dd312b9931d

Signatures

Files

  • 4052-135-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections