General

  • Target

    2264-83-0x0000000000450000-0x0000000000480000-memory.dmp

  • Size

    192KB

  • MD5

    22a9484a7499bb8ea55d0c22df7fc9e2

  • SHA1

    02f8f0078bc90f04380bd748b1fc9af1b4091a5d

  • SHA256

    4a7fb7d8d22f92a22cf9aa5272a388fc70de0fea07307cd1dc59861cc7d14791

  • SHA512

    ccae225a08565b3cd19ec62580f9d1a53f4da932192e7126f6beb4fc0d9601015b3a3f86e4c26f220c696db70f164de229fd31a687514a76ec0202ea1f02a7c0

  • SSDEEP

    1536:YDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gkr:o8sO/O2DnEba0LxNEyPNcmpTu58e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2264-83-0x0000000000450000-0x0000000000480000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections