General

  • Target

    1052-113-0x0000000000330000-0x0000000000360000-memory.dmp

  • Size

    192KB

  • MD5

    056a3f4927313adfad8771d95c686ebe

  • SHA1

    b7bcdc8165d4b25b31e190e53f3ffc20abae448c

  • SHA256

    9e48c00c1c2fd19ec32c6c4fe975cbc53087afd4ca6e8b78707141751f3d90f7

  • SHA512

    b30d7ee9e6984aeeea827fd394ce390411beb168a851c2ca9233e4dbbbf5056e3080e58bcb0afccd34fa337e8094739f68fad391b8267c140a216fddc8043e13

  • SSDEEP

    3072:/nOrlpyS3xp5xN1yJ/4BMzxUdE/R8e8h+:/Of7flBMzxUdE/R

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1052-113-0x0000000000330000-0x0000000000360000-memory.dmp
    .exe windows x86


    Headers

    Sections