General

  • Target

    4732-136-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    87673a36b0e8671e2680301d82480505

  • SHA1

    21e3c271439ecaacd6cb537e40dfcfe68e417127

  • SHA256

    75850b85dc8a442a7765df135cab6cb218b8b1d26a6d9bece019389bcb17d805

  • SHA512

    1deee4226f94d76cf19a599df1a2a8df653d868e08f38f14d914752dad4f0aae7ee3eaf4e97a487dc66f97e83b429c2eaeb66b1d8761e44fc4128a3da05a942b

  • SSDEEP

    3072:ZxqZWD3asIF6ScZaJSdYeeZ5zmhZ3xNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jQ:LqZHcZaw6Jmh

Malware Config

Extracted

Family

redline

Botnet

https://t.me/binjarky

C2

167.235.142.32:39486

Attributes
  • auth_value

    f9289121a4a0b09d98ea7b4a61b03cb0

Signatures

Files

  • 4732-136-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections