General

  • Target

    2056-83-0x00000000003D0000-0x0000000000400000-memory.dmp

  • Size

    192KB

  • MD5

    1bb6c2775f13ccb2054a2679e4fd2448

  • SHA1

    f95cbd54abb1fc0df02ecd893fffe4d344f40f13

  • SHA256

    317b94e21e7a48dd8487021e1b832a5cc524c00fe1a6c4139d32c55f391ba104

  • SHA512

    4992365bea43955a5470d27623108e32a8a71307dbf0e7114a965f1b9fd774624b8fe1ecccbca6bafd48039655e44ba2c15706b914a3804c0d0c43b7c0e7fabb

  • SSDEEP

    1536:TDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkj:H8sO/O2DnEba0LxNEyPNcmpTuh8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2056-83-0x00000000003D0000-0x0000000000400000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections