General

  • Target

    868-967-0x0000000001160000-0x000000000119E000-memory.dmp

  • Size

    248KB

  • MD5

    52f72199f0888c4270b41aae5f8adbc3

  • SHA1

    a27c4c461c78e300bf72d6c65e2d3bce9cd7c584

  • SHA256

    e25b02afff1c7c220ce5e8db58ca6952700e99eefcf96d1981db5c5a7c0b3474

  • SHA512

    b165ae776a2d771e76841ed5278544f0a75947db96138aedd9baac900f75f0fc9f29c8d24de6dd2545aadf96172b4aaeb2f366065c9227251d5567dcc51dd3d4

  • SSDEEP

    3072:DtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQA6:DJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 868-967-0x0000000001160000-0x000000000119E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections