General

  • Target

    2132-83-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    c16ca1663dd763cc5aabf5ded2537357

  • SHA1

    628b4d02efc9d1a3207b2551a4a78cfae88d8b22

  • SHA256

    dca440216ad960acfc032e86d984a4dc049e71ca3456b21ee89ff93d1020444e

  • SHA512

    c0eb96ef4e98fd3d74b8cdf43fc5b49f62eaeaf4082cadf88c9287cc741596dd7d6a85f183616f4ac40f06d304e09bc23e792b4044239914964523f44704cc4a

  • SSDEEP

    1536:IDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkC:48sO/O2DnEba0LxNEyPNcmpTuw8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2132-83-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections