General

  • Target

    1716-91-0x0000000000280000-0x00000000002B0000-memory.dmp

  • Size

    192KB

  • MD5

    35223496836ad581640b73f099639fde

  • SHA1

    ce9c877dbfc5721a47605fdc0dc48b090faa7213

  • SHA256

    85f5f3b366edd79b3fd378cbf07f5826ab136db7c1d0683f28bf9b24f1b514b3

  • SHA512

    5b941b0ca582dc4a3de1860087e9adcdb838eb512c8b3eeb5c35ab98aca58eff7f1c74f312886224b522e6f7020f4b5354e7ea7b0f59999cab2145d6443867f2

  • SSDEEP

    1536:VDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gks:18sO/O2DnEba0LxNEyPNcmpTua8e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1716-91-0x0000000000280000-0x00000000002B0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections