General

  • Target

    748-54-0x0000000000220000-0x0000000000250000-memory.dmp

  • Size

    192KB

  • MD5

    a8d8ecb29f92d5d7821da981ffa20b67

  • SHA1

    6a30972340220025fdbadf6f0f176c6dad4ef8bc

  • SHA256

    d07fe93703387bc6fd530abbe11eb61a5871f83460ca78b5fa0563c3ba4c3d56

  • SHA512

    b6e8a5313794a1711e05493a24a3539afd29daa18878951b63cc5caa864b0534c2210dea5e7309581803d99b631eaa0f6abe0eb665506d39e6e1cfe87c37015f

  • SSDEEP

    1536:1DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkW:V8sO/O2DnEba0LxNEyPNcmpTuE8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 748-54-0x0000000000220000-0x0000000000250000-memory.dmp
    .exe windows x86


    Headers

    Sections