General

  • Target

    1956-113-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    abe41ae380750efad52c78bede08f65e

  • SHA1

    da00ea6e2954ac8c012331abdf3c226e559283e8

  • SHA256

    b6a964bd4189f838309a2b7c9eb6de8653b6724404fb138d9e0e601be4e170b0

  • SHA512

    fa00a77b196dfc7c3577ba0bdacfe137031a2c97c8194dee6acd50d69d245b51d44d34fa280e543c8608c11013fc834c3d94a4a65c298ab8917032e059377082

  • SSDEEP

    3072:tnOrlpyS3xp5xN1yJ/4BMzxUdE/28e8h+:tOf7flBMzxUdE/2

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

narko

C2

83.97.73.134:19071

Attributes
  • auth_value

    a9d8c6db81c7e486f5832bc2ee48cb84

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1956-113-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections