General

  • Target

    3068-83-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    b3e01cd5011e5b24e886f2d54f1534b7

  • SHA1

    17dfe3661a56cff84499c9a455bd92259b38ebf6

  • SHA256

    db52f98d219d1820f6f734d9ec8f9cc7b7451466c0ed3db1970e696e82019c92

  • SHA512

    6e2926d9024a7ffc4df8c2ed39580c273a26cf77a694b04a884020f19db59b3abbafe4c239e6c8b469ceef00b26ab2cc29711835a3ca6dca1fe1acfa3a6e20ce

  • SSDEEP

    1536:mDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk9:q8sO/O2DnEba0LxNEyPNcmpTuD8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3068-83-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections