General

  • Target

    2272-83-0x0000000000350000-0x0000000000380000-memory.dmp

  • Size

    192KB

  • MD5

    840d73c8c51a91db4bf267422c7a5ad7

  • SHA1

    2edf2cdbccbaaeafad70ab93573af976f30e8534

  • SHA256

    4267bd0f88663adf8f227fc576b4497df4523d0777ce8b546524253e68ab0ba3

  • SHA512

    ee401c3173df39a8d2defde09bde47ef6e14d91394ab1655450bdc7e20b68da36bb2c79996a0f8f54eb57de229722cb8735734803e51ce72f5d168f253d2f2c9

  • SSDEEP

    1536:gDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk7:Q8sO/O2DnEba0LxNEyPNcmpTup8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2272-83-0x0000000000350000-0x0000000000380000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections