General

  • Target

    2064-97-0x0000000000300000-0x0000000000330000-memory.dmp

  • Size

    192KB

  • MD5

    c8248ae20f1b4088c7e5fdb35f7d3e07

  • SHA1

    1ddb1f8823231ba357cd9e8e32e2562c18791775

  • SHA256

    d93f96e46dc10bddff8d142e4af241500581bdf988d5ba0ec7d4d12f8aee8d0b

  • SHA512

    d3c9d96a0f2f3e5444d1408239fe7faec76f6684a35ab721d7cacc3dd0ba4d91f8e5037ca9e337d3a14ca4a8f7efea58adde8138248c7ef352ea12d3078b24d9

  • SSDEEP

    1536:zDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk0:n8sO/O2DnEba0LxNEyPNcmpTuS8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2064-97-0x0000000000300000-0x0000000000330000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections