General

  • Target

    1360-123-0x0000000000320000-0x0000000000350000-memory.dmp

  • Size

    192KB

  • MD5

    3f2de3ec5248b6a198f6ea1f0b79039b

  • SHA1

    d07fdffea6b0cf7bccc9382aef78016de0e9991c

  • SHA256

    32beebe6bbd7dbd9172c72e448d1c9a1f578bd134575b6bd45cb3b75d37f3cf4

  • SHA512

    0b8a96a2975ea906962439960d20caf9d859fbb756a0c029563a25b8d025164209e20222ce42961bcccd88ec066f360f921229602953eb59cdd04508ff57f6e4

  • SSDEEP

    3072:YnOrlpyS3xp5xN1yJ/4BMzxUdE/e8e8h+:YOf7flBMzxUdE/e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1360-123-0x0000000000320000-0x0000000000350000-memory.dmp
    .exe windows x86


    Headers

    Sections