General

  • Target

    2120-54-0x00000000001B0000-0x00000000001E0000-memory.dmp

  • Size

    192KB

  • MD5

    9b5226b01888c160dfb0993441fcb427

  • SHA1

    77800d319a1f4d9dfe776362a658deda6dc0157a

  • SHA256

    4bfbb5a2e4ac56a202594f4d539acf1ff80f28ad2b429b74f67483ee3e3ab90b

  • SHA512

    80d0456eb3ba188dc9ee50e3a2159bf7b89ce0b71cae36725e44184cdcb24e2f3d4a870d4c25491ecb0ccc73ff2cf2116f6f95f08b2d54b45e14eecba6bfa614

  • SSDEEP

    1536:tDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkB:N8sO/O2DnEba0LxNEyPNcmpTuH8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2120-54-0x00000000001B0000-0x00000000001E0000-memory.dmp
    .exe windows x86


    Headers

    Sections