General

  • Target

    636-54-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    139e3950532f842e7f63119fb6279fc4

  • SHA1

    1caf8a11e8410fc96f36837fa5ef0dbf32f995a8

  • SHA256

    40c7df24f2a8a2b1d58bb520a940a540ef809267e3ae2b66ba378fc4f2d6c093

  • SHA512

    28e0f222119ebc3689fbb1844ae236b67d8890b2693f97648ccc4d914a35eea18fdf2109eb6965bbfe252aad4207ccd336e3630e4887890167f3c56baed1b4f2

  • SSDEEP

    1536:ZDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkL:B8sO/O2DnEba0LxNEyPNcmpTuZ8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 636-54-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows x86


    Headers

    Sections