General

  • Target

    1340-83-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    0ec3f934eee91ad277761ca54f7d65f3

  • SHA1

    3c43610577f71ab07d61061a63843359c903be9e

  • SHA256

    50b15f1ab7484df4ca7d857f54bf170add2306c12cad8176b0ae6839307c9d9c

  • SHA512

    a2f5b633bab1166720e7097435954ffc9e6d7827d1db266573599340f3cd6d9cc531ec8a65daf9ac4c870f8d73d9bf084c6d8d67f589a2f93c7dd0576fdd2ef7

  • SSDEEP

    1536:+DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:i8sO/O2DnEba0LxNEyPNcmpTuY8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1340-83-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections