General

  • Target

    2084-83-0x00000000002F0000-0x0000000000320000-memory.dmp

  • Size

    192KB

  • MD5

    22f38bb1313d66aac97ac7a4809ec667

  • SHA1

    93bb0ae7d9f4014b537e81ab6cf0626b8cca1c8e

  • SHA256

    2e2f478fff680d22a0f0ef9287468989e8a5738727bae0e1c982c7104e2bf16d

  • SHA512

    820bac83189f712b88ed39e07f40301521aba79b43c8a601e2bb49511f7d152abaedc92791ec7263ac0bfabaf1fe3e117a20405eadef7b63d925a3a3add66a10

  • SSDEEP

    1536:pDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkl:x8sO/O2DnEba0LxNEyPNcmpTub8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2084-83-0x00000000002F0000-0x0000000000320000-memory.dmp
    .exe windows x86


    Headers

    Sections