General

  • Target

    580-3045-0x0000000000340000-0x0000000000372000-memory.dmp

  • Size

    200KB

  • MD5

    7d13b4bdfcaa5708e3a6526971185602

  • SHA1

    6d6aa67964b8d96012272b1f4b9c7778bfafaab7

  • SHA256

    fa3b7e6c5cc225a0eace8fdf64a6c1a97b9a627ea728df28d484886f8285a1ca

  • SHA512

    4a75d0ea1e1c8d3a0e6bd8d14f6291bc7b415914d13d0415e9c25bca2592782e97843079cd4900e9981e60fbe704c44cc7ff65e5946129ba979a6f6a15e698f1

  • SSDEEP

    3072:5xqZW11a2kX8f516fTKev/FThwnxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuz:rqZk516LTTh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Signatures

Files

  • 580-3045-0x0000000000340000-0x0000000000372000-memory.dmp
    .exe windows x86


    Headers

    Sections