General

  • Target

    1864-97-0x0000000000310000-0x0000000000340000-memory.dmp

  • Size

    192KB

  • MD5

    38c3cfe6a7a24e59b37abdb761b049e1

  • SHA1

    b67c40506c430276d02f651869ac761851a31f92

  • SHA256

    2fe1379568dcf0bee19edbf1cc728b15f1bea467e59d3b6a6eb9f28a9b73caa1

  • SHA512

    b0b210efc1fcc315ff71079ef5107e9511d1a75224797ba7db66fa1ef5bd5482fe84f37f93bf1fe72b8977d77735bd908f2a0c5774043624744c060882aa7e25

  • SSDEEP

    1536:3DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkn:z8sO/O2DnEba0LxNEyPNcmpTuV8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1864-97-0x0000000000310000-0x0000000000340000-memory.dmp
    .exe windows x86


    Headers

    Sections