General

  • Target

    1916-123-0x0000000000320000-0x0000000000350000-memory.dmp

  • Size

    192KB

  • MD5

    60e9c0d7e895f4e6f24d2ab3be4add67

  • SHA1

    97e0cfd4cdd38989eb869c3c9a676510e6d4e57a

  • SHA256

    388fe028b1a0504e050feccb40150b9f15215daeaac425884c7c66bdf2d6cb24

  • SHA512

    0e15353cb1d7a08b54e0509c90c6fd4d28d6b371fd404a0b303465be5f7b7278b60923b48378176b7492b3edd291d2f8d32a4ab387a43d27ea0ea3de3db804a9

  • SSDEEP

    3072:CnOrlpyS3xp5xN1yJ/4BMzxUdE/e8e8h+:COf7flBMzxUdE/e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1916-123-0x0000000000320000-0x0000000000350000-memory.dmp
    .exe windows x86


    Headers

    Sections