General

  • Target

    3048-83-0x0000000000270000-0x00000000002A0000-memory.dmp

  • Size

    192KB

  • MD5

    db0cb4e3c2021dd95ec19ad3b6829247

  • SHA1

    2f960b3f442642d8c6fe3140f0c8bca23b5777b2

  • SHA256

    4f7c70744e8c0cadf21bded4d31a7dfd0d7f31e83255c52d6333efa72051cdfd

  • SHA512

    96220b3c82ec6bc43de6043de4e5d8915b375a4e1cd41e8741129bc28870415a7f90929525247db8723f439efb089320ddd2ceb499290c9ecbedd15fc0a20972

  • SSDEEP

    1536:cDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk9:E8sO/O2DnEba0LxNEyPNcmpTuD8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3048-83-0x0000000000270000-0x00000000002A0000-memory.dmp
    .exe windows x86


    Headers

    Sections