General

  • Target

    1056-123-0x00000000005A0000-0x00000000005D0000-memory.dmp

  • Size

    192KB

  • MD5

    6dae91d77ff091fcb5a801fa1f8a38c6

  • SHA1

    5619efad70ce1843dde726c9321140479adf7f66

  • SHA256

    2d2813565cb3f32711d2977c4470729ea1c0af4e636fbaa2c061fe0d23e82f25

  • SHA512

    121f813e5f85f7fdaf56f418eac56b539556254d30b70f2e291229cfbcc8e6c60cb0da271c12e21fc09f7db8fbdd41a1509c5e37ad4901309690cd8e35574709

  • SSDEEP

    3072:UnOrlpyS3xp5xN1yJ/4BMzxUdE/m8e8h+:UOf7flBMzxUdE/m

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1056-123-0x00000000005A0000-0x00000000005D0000-memory.dmp
    .exe windows x86


    Headers

    Sections