General

  • Target

    3024-97-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    13b7d015eabd1cbbd0bda0ffaf4c8c32

  • SHA1

    c72f154d890e0516d8c1b410a7dc70111bced17a

  • SHA256

    1c1a8bda6b8c4540bbace6c00c58d2cbefad36111e5845c809e691dec6baea6a

  • SHA512

    74392b05bfb08a9ee7b05a7d104658aadbeffd14476ef69ac9688fc8bf9696fe7c7e742fa045c4d4ab455f34f9d066edac2309e8e29672045196bcc2a29096c9

  • SSDEEP

    1536:cDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkj:E8sO/O2DnEba0LxNEyPNcmpTuh8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3024-97-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections