General

  • Target

    3012-77-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    2debad314e6cd2785e529c435bad87fe

  • SHA1

    dca2db2948830ace3c904b9f3b6457f4ca725025

  • SHA256

    905f52affb2504e9bafb637112fae881c76241d65ea07ed9f33c8c82151df836

  • SHA512

    ad0e5b71729455c0cf0816eaa91437b398fbaa07ef3276e4b9684f37a87ea550ce063f2d1c2660a762e5014b62f233a001bb4ba37d9bdbb16f1505046ed2c7bd

  • SSDEEP

    1536:uDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkL:y8sO/O2DnEba0LxNEyPNcmpTuZ8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3012-77-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows x86


    Headers

    Sections