General

  • Target

    1884-123-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    1681f13c0f80c40ab3a307e3947ba456

  • SHA1

    cb6fa0b344ebec4ac601f4f87e7137c35f148553

  • SHA256

    b0d655df7db93583a02810c3d64cf83f28a7d95853872be31c39e86f371d6aec

  • SHA512

    9ee635b07465d8a17a988f3dae96ff11fddcbd1efc80617eb2d9f3201cec1dfb7e1ab577b9faaf781e3ecf4157db919c7c0faf3437ce90c4b0ad8d9392cd21e5

  • SSDEEP

    3072:ynOrlpyS3xp5xN1yJ/4BMzxUdE/R8e8h+:yOf7flBMzxUdE/R

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1884-123-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows x86


    Headers

    Sections