General

  • Target

    1088-83-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    3a25cc1af0f0da7b0541e90ea46b80fa

  • SHA1

    f99703b2c3018318dc56463dce36e75dc6846021

  • SHA256

    fd3e0cf7f443de777bc3f463d9e3a301556daa9a661e7830f17ef7399dc67960

  • SHA512

    b33b4550af6c7883badfa452e8d99a7f9b41406e388c936cc8417fe10f384027ee00dba5ca90b1189cfac3b14db9e6f3af0e27ea566d538e8186df113cea3138

  • SSDEEP

    1536:WDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkC:68sO/O2DnEba0LxNEyPNcmpTuw8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1088-83-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections