General

  • Target

    3048-91-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    1134285e67b4273a42e44033a49361a0

  • SHA1

    a71877b29b19911f5692d491e642eb19738a0b36

  • SHA256

    cfc941498798aca622e50164cf567f04c7d99ec0067afec25fcbfc16d0ddd7ea

  • SHA512

    246a5e1ac5d31303e655eb49929862f2dc07c9aea6529bf3351664a5e5a69c2bd51e9c79e8fe409cce801c26bc5a556cecc7188daed6af282889ca022e0bffee

  • SSDEEP

    1536:TDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkC:H8sO/O2DnEba0LxNEyPNcmpTuw8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3048-91-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows x86


    Headers

    Sections