General

  • Target

    2024-952-0x0000000000C90000-0x0000000000CCE000-memory.dmp

  • Size

    248KB

  • MD5

    db0b2198756225fd93d5cd402f0d6c21

  • SHA1

    707f07f4d5caeadea91c00a13d69a5108b9358b9

  • SHA256

    afce47d72e421be7c0c6b14ddb6fe776b03699d66b517b41ef23d0666720863f

  • SHA512

    71d2838e48577a00deaa9937022f25363a0abd9f9b142599add109e3bf78f97dd6df362a78a5a390e99ff87fc30211aef032d6fc02d496db15814a8f78e26151

  • SSDEEP

    3072:ftJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAW:fJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-952-0x0000000000C90000-0x0000000000CCE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections