General

  • Target

    3188-153-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    1a284c185e712ac2ef0a6462ca107307

  • SHA1

    0646c0a723050f1e9f411beb3fc68672ad6fcdee

  • SHA256

    fcbb40cb64c37f34c1b6dfcd9bd6be4e96f25e4c69133942615e7b84ba474a52

  • SHA512

    b22655937365a7c9828ef091481d47bfd54c229426a001783377c790a5adb142f8119152801c97b51c634b1b62e4d449e4e68776c887901eb744dbe769f40107

  • SSDEEP

    1536:9DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk4:98sO/O2DnEba0LxNEyPNcmpTu28e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3188-153-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections