General

  • Target

    2620-88-0x0000000000260000-0x0000000000290000-memory.dmp

  • Size

    192KB

  • MD5

    8e68a0f1f1f6d3b31d4f406cdcc358c4

  • SHA1

    33234e6fa1263fefc4bd710b4b82632bad2db20f

  • SHA256

    50f93a8b3fdcd458319e4acdd70989e3e784c9ceb9497c282a0376800cc6e9a5

  • SHA512

    0fb720b955ff1024ea446b404229080744625c56408b068dcefbfa53cf237bcf15613b49c9db15e0169deae81909e87f6a635526d49b08181ab9fcb21eaff3d5

  • SSDEEP

    1536:NDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gka:t8sO/O2DnEba0LxNEyPNcmpTuY8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2620-88-0x0000000000260000-0x0000000000290000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections