General

  • Target

    316-113-0x0000000000360000-0x0000000000390000-memory.dmp

  • Size

    192KB

  • MD5

    d7072868997fad8ab6faa1496233435e

  • SHA1

    af814b153567379f937617c299fd72e8bce7e4a7

  • SHA256

    e6774e678d5833712780b65418ce52768ba09e1f6b93b2ac800903af381a5d21

  • SHA512

    48c647f98db66614c29f0e074e193be0157bd1e431cbe7dbfaf773c1275d827cc532a5d1c85c1deeced9cb63e4de693ccec43005c5a05f2ffaa01e2fcd36ac1e

  • SSDEEP

    3072:AnOrlpyS3xp5xN1yJ/4BMzxUdE/a8e8h+:AOf7flBMzxUdE/a

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 316-113-0x0000000000360000-0x0000000000390000-memory.dmp
    .exe windows x86


    Headers

    Sections