General

  • Target

    2180-91-0x0000000000440000-0x0000000000470000-memory.dmp

  • Size

    192KB

  • MD5

    a76d3c3a30e2022f865a4fcfa3c367fd

  • SHA1

    bdbaeea16aac65013366f6fd6f63dc0b17941676

  • SHA256

    2e9fa9cfc7ca008156753e79b096bce50a87025ab42ed9f412514344e56fa79d

  • SHA512

    5148f97ee2998b9989f36369600caf6863ae08b5c08fb4905848368b06b18359404f7113636c68aa5cd16881e78ddf649ccb12fa4c4a3844f38c01d122978428

  • SSDEEP

    1536:KDrRuq1Ps36sv0W7TRVOQM6fwrHwhn/rQbg5fb25LxNcqYQHnbuxaNLQmpTu0Gk4:m8sO/O2DnEba0LxNEyPNcmpTu28e8hT

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kira

C2

77.91.68.48:19071

Attributes
  • auth_value

    1677a40fd8997eb89377e1681911e9c6

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2180-91-0x0000000000440000-0x0000000000470000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections