General

  • Target

    2208-749-0x0000000001300000-0x000000000133E000-memory.dmp

  • Size

    248KB

  • MD5

    c903bd9c458d1f2ce9d8b2a1f3d2c4d4

  • SHA1

    83bd0315ab5aa6d14f7e652a9941337e77248297

  • SHA256

    47cb7c6a482f6fd82b637b50d23a36594e0fc18b8770c3e95b60fc240a987ea8

  • SHA512

    06efc993ec5cd5df9a499a77723c769b785e5ece5058f922cd6259b1c755006f9334fd62581ba66348dfb894dabe921a168a6358b470281520b95c743ede291a

  • SSDEEP

    3072:WtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAI:WJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2208-749-0x0000000001300000-0x000000000133E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections