General

  • Target

    556-113-0x0000000000350000-0x0000000000380000-memory.dmp

  • Size

    192KB

  • MD5

    c06eb244beb0934c24aa8369cb8df138

  • SHA1

    af01a693a40a94f20869a7deee5e26e54b19343e

  • SHA256

    0d23aee5f0e7fb314bafd0d7c8cfb66b2d164216ebedecfc48f093aafe7e4872

  • SHA512

    f6e916b4ce07a2807a54d7d40913c40aa5d4634e6231fa8b1f1dae63131e49e4a164113d5090f19e7d7e6654bf739c42f1416779a2b437388650c85579b8fec8

  • SSDEEP

    3072:ynOrlpyS3xp5xN1yJ/4BMzxUdE/H8e8h+:yOf7flBMzxUdE/H

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 556-113-0x0000000000350000-0x0000000000380000-memory.dmp
    .exe windows x86


    Headers

    Sections