General

  • Target

    3000-101-0x00000000007B0000-0x00000000007E0000-memory.dmp

  • Size

    192KB

  • MD5

    2f9b7142564d7794d4e127c3aaf7326f

  • SHA1

    51ffce2bdb01daeb456e3b4bda3d0ff79db6166b

  • SHA256

    6fb38ebd2ff6bd5d9fe25f1a84027f05582c5a311a210c5818928cc704c9f7a6

  • SHA512

    f9cfeca1843dd617cc80d72b699a7c9e7af37ae22011b4166fba5beeab481df65736d4c3c2d0005b66e5f522041103f3e5368710e48ada5069337a6722a5a886

  • SSDEEP

    1536:yDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkh:u8sO/O2DnEba0LxNEyPNcmpTun8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3000-101-0x00000000007B0000-0x00000000007E0000-memory.dmp
    .exe windows x86


    Headers

    Sections