General

  • Target

    2080-77-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    e45e8cbaf0af7b6d600d55eb14408f28

  • SHA1

    892108a9a86ae165785e8db87f71c7bc30a70c1f

  • SHA256

    6bc0ab0a0ee3df08b685f9fc76e8b0060e448c1941a8583810a85608cfd4d993

  • SHA512

    1daa7336a74a8b5088ee85291ee6653340cba16d277e14e209d7336eb46932e079cf6c2f5152125f86cfd0cb9deda584ffd828e07e20f08695c2446985c9d3e4

  • SSDEEP

    1536:jDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkC:38sO/O2DnEba0LxNEyPNcmpTuw8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-77-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows x86


    Headers

    Sections