General

  • Target

    3052-651-0x0000000000CC0000-0x0000000000CFE000-memory.dmp

  • Size

    248KB

  • MD5

    51e583c6dea908a3cf7c3fe9f6f32f56

  • SHA1

    b435c85d6d639086351989c570090d6ed2ee3fe6

  • SHA256

    d03f063434db18e47072214495328fbab48a13b34e5585741cac29f95c53d8fb

  • SHA512

    ec2cabba9197cb145425ac388eb71e614440ea64f3949cc8585999461e0ee330835ad0d6ec4fd259a5fe23f2f5727a570e66a11ce2ca997910dc34daec274f96

  • SSDEEP

    3072:HtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAF:HJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3052-651-0x0000000000CC0000-0x0000000000CFE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections