General

  • Target

    740-91-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    4fc7568ebf059a93cd94d30729e7838a

  • SHA1

    c8cb66eee111d026a09d6c2587ee126e08dceb43

  • SHA256

    d768711bf4f4a3ed635b2be004cb6dca8cc3a662f058240d4825f3a938d750d1

  • SHA512

    8e8a3b324e02da84dae0f4ce5ec489c373848018a79e48f1322e68eaab4b57a3b8e114dd93cc7d7c41579d2cd31dc5b649970784337b8262ef62afdfb608b102

  • SSDEEP

    1536:IDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:48sO/O2DnEba0LxNEyPNcmpTuY8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 740-91-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows x86


    Headers

    Sections