General

  • Target

    1104-83-0x00000000002A0000-0x00000000002D0000-memory.dmp

  • Size

    192KB

  • MD5

    b2737550496ab32bb0b01dcbc430c14d

  • SHA1

    cfc556b9232dab3acbf5a43e8f498f1343c73f98

  • SHA256

    11d1834422789655a285a05eef3b997e7db6ebf4e312ae22ff5dcef150ae4041

  • SHA512

    f926d2f1ec05ad09ff51b2357b33ced9284845f5beffef47941327ad129091768917c90019049cd71c5e834198c34a376705d138eed26b50186bb590b9bb0f83

  • SSDEEP

    1536:jDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gke:38sO/O2DnEba0LxNEyPNcmpTuc8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1104-83-0x00000000002A0000-0x00000000002D0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections