General

  • Target

    4044-153-0x0000000000450000-0x0000000000480000-memory.dmp

  • Size

    192KB

  • MD5

    7c3f512298c5dbe402c335522aae0b74

  • SHA1

    f09a77c4bd79b8ce9576dbe73a93c6f012de2e04

  • SHA256

    202616ea8836fe8dbe583f0a4c3f73efdb8c74dab8e854999ff4a14db2d416ee

  • SHA512

    baa7c5411d5e021dd6feb7c1982cd5e83096007dd093f5699a9ddeae4b9bc62cb5148269b93d88288cb7995392bbc25dd7ae10081a99192a357b4322bf84c633

  • SSDEEP

    1536:xDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkr:58sO/O2DnEba0LxNEyPNcmpTu58e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 4044-153-0x0000000000450000-0x0000000000480000-memory.dmp
    .exe windows x86


    Headers

    Sections