General

  • Target

    2960-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    6d5c9190696ba31c95405a266cb2b673

  • SHA1

    5534da0be7f396e72eb98af508ab6396ceee6543

  • SHA256

    c2c712e3f501d4a3fc0cbb51f2c98a5735f4221d9e26121072eebc89f6306651

  • SHA512

    e818752348143c5618fc3b2f3afa81096814d9e335312a02e581040732bdc94becb3130637a8378340ba46eea857a94ec3a7e4fbc080592410893dd027fdf466

  • SSDEEP

    1536:1DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk:V8sO/O2DnEba0LxNEyPNcmpTuu8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2960-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows x86


    Headers

    Sections