General

  • Target

    1740-123-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    8224eed9e1262f3cef27f2fc8b84a5d5

  • SHA1

    fda70ee087f5dbe5f47bfa44979f4103525d3701

  • SHA256

    bc2edad3be62f6ddb8442d9175218f51a7006bc866df9036a3e7e948f32321d6

  • SHA512

    3a60c35548ea30a4246f1ce43556974a59a0a365be666b1dfe22d675b9dc754424f9040d7aceb31cb22c5e66602e5ddbbdfa3f49689dc98b0be3198faa57e322

  • SSDEEP

    3072:AnOrlpyS3xp5xN1yJ/4BMzxUdE/y8e8h+:AOf7flBMzxUdE/y

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1740-123-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows x86


    Headers

    Sections