General

  • Target

    2040-1077-0x0000000000890000-0x00000000008CE000-memory.dmp

  • Size

    248KB

  • MD5

    53b2923bf115e3cefa2cd6ec934eb0fa

  • SHA1

    e48bd5b7d057ad6d1f38334f076bf150b22c51d9

  • SHA256

    8be42bc4196c0d380373f8dc47d6b44cbef7efbe1336b0132c45979b521ff35c

  • SHA512

    ca2a8057a967b7f62db7c0bb5050b6723ac5b95d1aff56e91cf11faa05544a3a74544c4e9ec6ea73314347b554764933b3a130cf3e45dcaad5028dc77a990cc2

  • SSDEEP

    3072:xNv0S/yQKnhNgcoVQqw5TmJOXkXt/qYJanR1TaiV0VnCkMS0:xi4y5hNgcoVQJ5n0d/tanR1aQ0VnCkM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kolyan

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2040-1077-0x0000000000890000-0x00000000008CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections