General

  • Target

    1904-123-0x0000000000320000-0x0000000000350000-memory.dmp

  • Size

    192KB

  • MD5

    eda600d695ee1360480011b5c904a290

  • SHA1

    0016fa8ef62e7d5c0e841de5f1b8a0308ebd2f28

  • SHA256

    3efe4f3c1a3fa4dfe335ef71243b7f9c305de59f64c9ba762d6ce30e34a5d72f

  • SHA512

    c5a17a627b2fc20da42258d6ab749902843c2313946cf0061b3809b2f28f5f6a562220ad8f5f7a2daccf5a9db45d50114cd02fb193417699817a36fb962517e1

  • SSDEEP

    3072:HnOrlpyS3xp5xN1yJ/4BMzxUdE/e8e8h+:HOf7flBMzxUdE/e

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1904-123-0x0000000000320000-0x0000000000350000-memory.dmp
    .exe windows x86


    Headers

    Sections