General

  • Target

    2560-91-0x0000000000320000-0x0000000000350000-memory.dmp

  • Size

    192KB

  • MD5

    65600c0a5c604a726da59345018b9c71

  • SHA1

    c9793034dc4420a57070e3b455328c66eabb9a03

  • SHA256

    c81b3916c913ad65cce8e4ff7b7f5cfcb026544659287b9f7ef6397aeaa97d0d

  • SHA512

    be8de3bfec7ab589971bf356bf06d9b4b5679323a9473fb2a44f734d65a501a75b8e13863dd86566086f21ed86b1796cbd0ad871c7d9f5de27dcfe518be4861b

  • SSDEEP

    1536:ZDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkG:B8sO/O2DnEba0LxNEyPNcmpTuU8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2560-91-0x0000000000320000-0x0000000000350000-memory.dmp
    .exe windows x86


    Headers

    Sections