General

  • Target

    1700-91-0x00000000002D0000-0x0000000000300000-memory.dmp

  • Size

    192KB

  • MD5

    143cd7949c5f2bc0b89ed46b31c8b219

  • SHA1

    4e1f14e4129f7176104e4c418632966519bf6b80

  • SHA256

    946f6fb321b844b878b2e6c36c95ea8446695e0de0e139ce0026cddb1b0cc917

  • SHA512

    79e46abe0d2ddb8034fcbe043da7cd099d7ed9d006f254e7f7e8e6b82d0988e5497f6e5bd436de420b45783bac499eae629cec7f8d9f6b5fcda359ecefc2f836

  • SSDEEP

    1536:0DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkz:c8sO/O2DnEba0LxNEyPNcmpTuR8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1700-91-0x00000000002D0000-0x0000000000300000-memory.dmp
    .exe windows x86


    Headers

    Sections