General

  • Target

    364-97-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    4c37ce70ccddcd2bf0e5ad674c939aab

  • SHA1

    ddab405bd9df437cbdab89877e59e5549f9b7f55

  • SHA256

    7aaea8ab03363b90997426bc322cd5ab8a7aeb4392e8846afd83e0f29363b155

  • SHA512

    a6b1bbe71dd81f40e574933e1af9313c74a33cc5aeb3b812b8812d28d2747b069edcfc4365c8b0b923f82c7795fb9eed355dbcdfe70dda2e317c06646a0870b9

  • SSDEEP

    1536:VDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk9:18sO/O2DnEba0LxNEyPNcmpTuD8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 364-97-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections