General

  • Target

    2964-83-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    4a7e1b4a063aebe3bd97f66121477afe

  • SHA1

    ec0874b0f1bf05c69ae7113121d12437dd9ff1e1

  • SHA256

    adf57b56c1473a3fb44b1f181202a6ad85af5d8bccfdee1cac571c81301311d1

  • SHA512

    82b02de026d08797f20f2ced84ab925f490661c0a70518681a3690d62ed112d0370cbb2df14f78e84fff2c2c9c136dfd9cae325d9549010230684d4bba9e26ac

  • SSDEEP

    1536:WDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:68sO/O2DnEba0LxNEyPNcmpTuY8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2964-83-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections