General

  • Target

    2000-56-0x0000000000400000-0x000000000042E000-memory.dmp

  • Size

    184KB

  • MD5

    2ba1dbd52d23fff431c29902a10a39dd

  • SHA1

    8b3042b11df62961c20320d167a3f5b37de87171

  • SHA256

    05ed1e4b0a80d966d1a2f115ab10e5dd8aeb6e12ebf70a6ac0b3a89688dd638f

  • SHA512

    7fc1a754aed1f3eab5b0dd190bb71914b9599b14e69fa4619e544bbb38878cc08ec7d0985771504c0db6c5de614856d6f0c060d58a3787dae31e2822e611dbe3

  • SSDEEP

    3072:XaEgQCqb1A0C2oEtCkqVeVxTlol+p89e8e8hr:XaRjqhCjEQk1lol+p89e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

INSTALLAB2

C2

65.109.128.140:27702

Attributes
  • auth_value

    5e938a230b2dc75cf1ddef19b610ef84

Signatures

Files

  • 2000-56-0x0000000000400000-0x000000000042E000-memory.dmp
    .exe windows x86


    Headers

    Sections