General

  • Target

    588-1309-0x0000000000400000-0x0000000000432000-memory.dmp

  • Size

    200KB

  • MD5

    4e25c8258f67799f25424f4cd8f71fbf

  • SHA1

    434babf24dafb7f05cd4ea3ff8daf753978b61ba

  • SHA256

    8ce433bc830c309636725c804e2860dc8e546d43bf1622d3e79d9a07aa61e1e5

  • SHA512

    54b3ec6daab4badafc7d509fab3aa2231ffea2e7e05ceaf6bcd4ebd233e71742544398d8c501c193983387737353f839a34d824ed627249629688bbb0fe923f5

  • SSDEEP

    3072:txqZWzvagwoMR3Q5DeV59kh0fxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuw+P:3qZVOIkh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

Anh123

C2

199.115.193.116:11300

Attributes
  • auth_value

    db990971ec3911c24ea05eeccc2e1f60

Signatures

Files

  • 588-1309-0x0000000000400000-0x0000000000432000-memory.dmp
    .exe windows x86


    Headers

    Sections