General

  • Target

    4300-193-0x00000000002D0000-0x0000000000300000-memory.dmp

  • Size

    192KB

  • MD5

    26d0db6ed611b042045c72b45f3cb710

  • SHA1

    7f91d0118f73240a1e07a099b1e7551665622c68

  • SHA256

    171c3f12e5a7b4da3723a3ad8ff564086f0c42e62cdba8f2b6520ce594c68d0a

  • SHA512

    df6d55347c02a0b68631686df9d40650bbabacfd62c88e6788973ab818b57f671b53ac90775c56f4bf6b5fa2c4b6357be622dfba3a0f4c711f9a40eb8c32b7f7

  • SSDEEP

    1536:wQQQqlVZRGWkNFrfZ9mVRYALATeTGqVQbudZvPB1i+7s83wYkx8e8hM:wLOF4VX+qVgCvZ1imsj8e8hM

Malware Config

Extracted

Family

redline

Botnet

@COSMICCLOUDADMIN

C2

20.226.69.130:30497

Attributes
  • auth_value

    0c9b7221bd50ac4f7beb692ba88b2c78

Signatures

Files

  • 4300-193-0x00000000002D0000-0x0000000000300000-memory.dmp
    .exe windows x86


    Headers

    Sections