General

  • Target

    2200-83-0x0000000000250000-0x0000000000280000-memory.dmp

  • Size

    192KB

  • MD5

    f0bdae36d30c067de77b47770b268343

  • SHA1

    8db928f413a2e7f8a61c641560acd98ae40b5e1e

  • SHA256

    372335374972530af0cd2d6073579cf893afe2a573f35371ce1783ea82b96114

  • SHA512

    c8652788c6d3cb667395496829528d87e19b0d9d5ae9ccd74cb7cc9aa797dc0856a9698059a8cd9cd57875512640a582d6562dbbe573101962ebad1d5861b12b

  • SSDEEP

    1536:6DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkL:28sO/O2DnEba0LxNEyPNcmpTuZ8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2200-83-0x0000000000250000-0x0000000000280000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections