General

  • Target

    3960-450-0x00000000001C0000-0x00000000001F0000-memory.dmp

  • Size

    192KB

  • MD5

    7d04c28089ad7dc242286a469ed42765

  • SHA1

    2400b761ad1fd69d6ab3cd343d95fa780356af6b

  • SHA256

    b824dfeab5ae9527b333041b58f274ef2bf7f8bbe7c0b1eaefdc286268205d25

  • SHA512

    350388f155dd3ec48bfb2997b0504a261ca8c695e1615f6edf7a23be951a50108c82efbe100f1c2d451820428f0c09a03c377f8b2112059a751339582baf2df2

  • SSDEEP

    3072:1fGrCu6nlIPSkmsb+FxN3IiGli88e8h7:F1lIPPb+hqi8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kekas

C2

45.15.156.21:15863

Attributes
  • auth_value

    6ecdf4e57ae2bf9d2944e6cc2f89c4f2

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3960-450-0x00000000001C0000-0x00000000001F0000-memory.dmp
    .exe windows x86


    Headers

    Sections