General

  • Target

    1956-83-0x00000000002D0000-0x0000000000300000-memory.dmp

  • Size

    192KB

  • MD5

    7866204c5dada97d8b070dd3fb459fd5

  • SHA1

    f67733cc02ee26fb6d360260475bc5338042bd6d

  • SHA256

    27e71e9238120911c62d99f33772db48670f4871005d3a5268987c93451474fb

  • SHA512

    b16d0ebb829acf0ea86059c9e7912210cf3ba1263c7828df5705e675b02178e079d632587a28419b339846d49efbdf673d4ca778fb7924ccd0796bce92ca6555

  • SSDEEP

    1536:3DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkz:z8sO/O2DnEba0LxNEyPNcmpTuR8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1956-83-0x00000000002D0000-0x0000000000300000-memory.dmp
    .exe windows x86


    Headers

    Sections