General

  • Target

    1672-55-0x0000000000400000-0x0000000000430000-memory.dmp

  • Size

    192KB

  • MD5

    209e7cf34d1a363838f3f8d5f5847fe6

  • SHA1

    89c288422c60cffbca84a7cc1e94c98ff743f1c9

  • SHA256

    9c8e60782e41ac7686f785225e3b9a13076e1e5aba81100c15ad7e1a0b8a7bdc

  • SHA512

    388d797cf19120e91377cd0b3e666b3346abeedaa954a3a1ebf90742e7bb89ae5d92c31d53a1ece6a61732d8313df482286b74145bf574790334f2f9fbc7ba06

  • SSDEEP

    3072:GCB5vHxQE8jqV8i2nIDIZ7iSnMo8e8hb:r5vRQEA+NDIZ7iSnMo

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

April

C2

65.21.66.229:43749

Attributes
  • auth_value

    bc45d1babb14328517bab03ae5ffab51

Signatures

Files

  • 1672-55-0x0000000000400000-0x0000000000430000-memory.dmp
    .exe windows x86


    Headers

    Sections