General

  • Target

    2840-54-0x0000000000220000-0x0000000000250000-memory.dmp

  • Size

    192KB

  • MD5

    016b1072d3b0878a535090e11f3983d8

  • SHA1

    e0d28304ba2cbce1c9ecc7f3ec230ec83d86403b

  • SHA256

    47bcf9bffa219e6823fae8a8eb746822afbe2a7312bfdafc8ad86920b85a0cf3

  • SHA512

    49e7586fc851b8fae4e825ee87af125dcd5c848c70c832639af4d6c1aee38644b4a699f991798f2927a62bc9f2e7ad91553b69cd460ce5c9cbd85dae74d68d61

  • SSDEEP

    1536:HDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkW:j8sO/O2DnEba0LxNEyPNcmpTuE8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2840-54-0x0000000000220000-0x0000000000250000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections