General

  • Target

    2880-77-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    94f18df3d8ca107b2f57347711e46796

  • SHA1

    9cbda3e0e6680a70b403cbc92c42098246abc5bf

  • SHA256

    0b7c6f1c97afd000220655558f5e2d49bf46b4ce694931c03acd3122be916e8c

  • SHA512

    441f6caa972f4926596a9fee259a11474c1bcbc0688669a8ad909f3eea18be3e51ed0e7675b05ab22b8d70cb2c2ffd5d5ed6f30a1bb9edb1e9cb3ec50bea8f18

  • SSDEEP

    1536:ZDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:B8sO/O2DnEba0LxNEyPNcmpTuY8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2880-77-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows x86


    Headers

    Sections