General

  • Target

    576-97-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    e510df716cf449f87882316c1258e295

  • SHA1

    20f18bf30154077e7f131e4370ef1f3e89d7201b

  • SHA256

    6e2e217d37a3690cbfc90bda5eebf93cde652ace2cdc38148e2e95cc883decff

  • SHA512

    aeaa44559b71dd0982eddd2e9bf3f1db012e4dc01897b09feade53d5ea491a9d3fd3ca68bcf20153473a8a6e9d2a0e7f37b296ff569c4d2009f66f7dd1b858c7

  • SSDEEP

    1536:tDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkj:N8sO/O2DnEba0LxNEyPNcmpTuh8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 576-97-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows x86


    Headers

    Sections