General

  • Target

    3040-83-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    34b6278537040d03e75d812db2aa1a00

  • SHA1

    2220dfd5f13fd410b53555863209a6af3fa89a77

  • SHA256

    09e2244113c9ea3156298cfdbc6b7de2a7f1f2db659a494545449b0483bb0ef4

  • SHA512

    f98ffabb1561dbc3da6a5d209cdfd7b4f8fba4e8007d810574e0d12250cb1c9785c53c768c67f30957009c5635d440e4bf2228f59a423342820e757c0d0994aa

  • SSDEEP

    1536:rDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk4:f8sO/O2DnEba0LxNEyPNcmpTu28e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3040-83-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows x86


    Headers

    Sections