General

  • Target

    2028-123-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    63e6e02a64aacece39ce7205b48da51d

  • SHA1

    373d9ff4ad3689d2525a5b1caaec5ca303251363

  • SHA256

    49023abcbfae20b36f6522caa8f294b08d7abce6cdf01daa6849f8bc38106f58

  • SHA512

    1a22b5b14b5ec7fb06b10d77ffbbfc7b0ae213d42fd471c2c55a1786be3be417678b413b8ee9eddcfb7d703bbe6a6d5f8c08d160bb9287fd04d1e7e9723c3617

  • SSDEEP

    3072:MnOrlpyS3xp5xN1yJ/4BMzxUdE/P8e8h+:MOf7flBMzxUdE/P

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2028-123-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections