General

  • Target

    2892-91-0x00000000002E0000-0x0000000000310000-memory.dmp

  • Size

    192KB

  • MD5

    a6ab25c957ec079a6a0ae376df68afdd

  • SHA1

    c71d9bee17db66a146772671689186553f6de877

  • SHA256

    92851d634b87583fff2ba8ce4583457f04bb8736c1847b8cc4f5934044fec1e4

  • SHA512

    729d1b97d1d43d5af2a4a6a007041099f0fcdb025bde914434c21024a1be465ebb2f4a30e203a0dcb7f559ae8f965e3f5ca4a04c80570ed29505ae4fad545df1

  • SSDEEP

    1536:2DrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0GkC:a8sO/O2DnEba0LxNEyPNcmpTuw8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2892-91-0x00000000002E0000-0x0000000000310000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections