General

  • Target

    2364-54-0x0000000000220000-0x0000000000250000-memory.dmp

  • Size

    192KB

  • MD5

    69eca24cec0a83e46db3421147c35dd3

  • SHA1

    4eb602062b1fbbffc0e93689871427042fd948b7

  • SHA256

    1ad8ddde98351e10c246ff3775501c29787c95109af8681843b5a0e52fa890d7

  • SHA512

    bba3dda5d8a9702f2a311069d9b6c7c5a20e38ba33309ea372f49efabda1b625e6a92eda6947c4d8c1b30fc757f0213f1d51df2231491ed289bb0d6a6fe51c2d

  • SSDEEP

    1536:9DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkW:98sO/O2DnEba0LxNEyPNcmpTuE8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2364-54-0x0000000000220000-0x0000000000250000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections