General

  • Target

    1584-97-0x00000000002F0000-0x0000000000320000-memory.dmp

  • Size

    192KB

  • MD5

    2870c96824c24618232b2bf4ae1c5cca

  • SHA1

    141e12736b75a29150ac27509a8d791fb761a2d2

  • SHA256

    8474e80d9b4f43349f2968005de3fb26d3957e503649b49aa0c3a9769660f6c3

  • SHA512

    0e1ac9b713d033318f6f27016d53f801766f671314bbd58e24e5f971be295d849a67e56cf45a241590e87e7a8461e6d7175edd0b6e3a0b95b37300973f412a0f

  • SSDEEP

    1536:ZDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkl:B8sO/O2DnEba0LxNEyPNcmpTub8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1584-97-0x00000000002F0000-0x0000000000320000-memory.dmp
    .exe windows x86


    Headers

    Sections