General

  • Target

    1736-123-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    0ee04b16dc857867ff30132056beaed6

  • SHA1

    a09c734a23962e1a5ebf5f4f7dc36234acecba55

  • SHA256

    1fd9ca260889f860cc55b8a4083fbac075c39b3d2cbbabd9ac81d52535a34d9d

  • SHA512

    8e4fe765c2577f230725aae4043f43fa06693a5b77224dfa3fd0277c811c48888f2b12716fc78fc35905cd2471189863b857892038ae8af5c084c270e78c3e90

  • SSDEEP

    3072:TnOrlpyS3xp5xN1yJ/4BMzxUdE/E8e8h+:TOf7flBMzxUdE/E

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1736-123-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections