General

  • Target

    2360-83-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    72548ed6754e24ff27a781ea36765c61

  • SHA1

    1d9e6981043506a714846d5b8cda32cbd232fb49

  • SHA256

    7fff55ef1fde5464fdd87d93ce685a46c9fa6b8a73cd8d0cfc48e88c8970b69a

  • SHA512

    188038067d73ba285fc341d2af4c11d9b2f73f51919ad8bc2a086c0380e1d72b0656b3c481cbcfba881dfd0f6639dd193554eef8e50c6522413765841b5d475e

  • SSDEEP

    1536:IDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:48sO/O2DnEba0LxNEyPNcmpTuY8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2360-83-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections