General

  • Target

    1284-62-0x0000000000400000-0x000000000042A000-memory.dmp

  • Size

    168KB

  • MD5

    ad14a7005bcab742879511d292f5b3fa

  • SHA1

    18db5fc75db63f0af0820bdad152761a9bc7d2c4

  • SHA256

    794c16bfc928aef7c4dd25b072d4c9079c2e689912a9d495946a9617f36ae7f2

  • SHA512

    1ad72e97b885a30a8f15664bf123cee9621114ef2dc5c5896682d62ef87d6ad1bd3637bcdac3abda46483eca28db8da0a25888e0905583722766080836fe2eb9

  • SSDEEP

    3072:yV+m5cvQmRSN92dMb/ggGmWFZDhsZ68e8hF:yjGzda/FkHDhsQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kokta

C2

85.192.49.153:39029

Attributes
  • auth_value

    2a070a8b38dd88418889eb66f5fe75c4

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1284-62-0x0000000000400000-0x000000000042A000-memory.dmp
    .exe windows x86


    Headers

    Sections