General

  • Target

    1688-123-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    13919f7e348c2737b0b6950d1ddc9320

  • SHA1

    834d129910ac383d5085307d04f1f0e516a8ce31

  • SHA256

    6c65ee76a32842824967d82516aa163037c826c049304f0986ab63f3c0a4d9c6

  • SHA512

    b30dca6b2dffc62e521ad9464f292384f27ba4827b3438d0f47dcd1b4771332758423ed4b68b2503071fc5e44c440a0eee7fc5288b782f55f5d3fe4a029c2565

  • SSDEEP

    3072:TnOrlpyS3xp5xN1yJ/4BMzxUdE/38e8h+:TOf7flBMzxUdE/3

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1688-123-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows x86


    Headers

    Sections