General

  • Target

    1456-3058-0x0000000000360000-0x0000000000392000-memory.dmp

  • Size

    200KB

  • MD5

    fc0cabc209f48f21ac090891e664c424

  • SHA1

    6ee19fdfdfcb4db0bbf516112ad9e6021c5a4d05

  • SHA256

    bf9608295246d3ec7e116fe4ea1a755af6352166b64a48caad71f2694795fceb

  • SHA512

    f0c97e24e0a426f0716dac520e54f63ffec7974c087b7572eb5ba53003e7b02eafd5a9ed2ea3b523bf846e0a4159ec8a0a9b254d27b0138833aad3d4233dee4b

  • SSDEEP

    3072:kxqZWzvagwoMR3I58ZlHeR5FthXdxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOb:6qZVY8qth

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

Files

  • 1456-3058-0x0000000000360000-0x0000000000392000-memory.dmp
    .exe windows x86


    Headers

    Sections