General

  • Target

    1764-123-0x0000000000340000-0x0000000000370000-memory.dmp

  • Size

    192KB

  • MD5

    6ec75bbf63c5a9f79cb4e478fe7314b6

  • SHA1

    a493261c023ae862c9e832f2575a7fd1f35fb2ff

  • SHA256

    0b7007569c0d3faa9926161296131cabd7a7d58adfb7ae09504ead858f67d682

  • SHA512

    4eb45c63e69276bbfbe1327cc2e0c62021841476fcf407389488f54c553f1628166ae0fb9a4072586236eefcf18bc4e9a867a1ceae934e30c1c76d7365ae91a4

  • SSDEEP

    3072:pnOrlpyS3xp5xN1yJ/4BMzxUdE/s8e8h+:pOf7flBMzxUdE/s

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1764-123-0x0000000000340000-0x0000000000370000-memory.dmp
    .exe windows x86


    Headers

    Sections