General

  • Target

    1276-1005-0x0000000000C70000-0x0000000000CAE000-memory.dmp

  • Size

    248KB

  • MD5

    cfacf91dd3874cd73730e117f53bae72

  • SHA1

    081cee90c62d61c8852fb622051b149436f4c91a

  • SHA256

    02271398ab19ca50052d2ab3fa79b4901c0691299a0a1e80a8b6b5028180968d

  • SHA512

    1056ed31f2995bf33dc02572a4eea74145718aa34c94232fefa2405d04f1a91cdcfa09c3743580b3608956450a779ece7c9a62784de0c59dc72dab245d514f9c

  • SSDEEP

    3072:ftJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAY:fJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1276-1005-0x0000000000C70000-0x0000000000CAE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections