General

  • Target

    1444-113-0x0000000000340000-0x0000000000370000-memory.dmp

  • Size

    192KB

  • MD5

    21c9f7813d7a51d97b01b7a7e090758b

  • SHA1

    3e4f747078bc8af8d7e6cefe36c09b288824ffdb

  • SHA256

    fac92e23e2a51fc5f6e01d5ecc11d7f1de3a26a4fb839bbcbbba4a99bf22031e

  • SHA512

    2cb57cdc9c7513489745a39a87d0de4d09d605673ff022ba7f9010d84afcf51e362319cb26480ba3cb75cd09ebdcaba3fe9f1434a2d32de83471f2bd124a3c85

  • SSDEEP

    3072:jnOrlpyS3xp5xN1yJ/4BMzxUdE/s8e8h+:jOf7flBMzxUdE/s

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1444-113-0x0000000000340000-0x0000000000370000-memory.dmp
    .exe windows x86


    Headers

    Sections