General

  • Target

    5336-783-0x0000000000610000-0x000000000064E000-memory.dmp

  • Size

    248KB

  • MD5

    914b6aa397cf5ccb9c1decbeb30f3e33

  • SHA1

    6f7ac9e5342facfd9b7b0f4b54e184910f43fecb

  • SHA256

    031508488e24a7e886f45645cce49040f34d0ef6acacb27b44a7c1b0d6990ab2

  • SHA512

    682909cb6611959afdc0afac207f128faa00851319ba6a4190a927bed40b72540b1c151e053c0905d1ad02336c7fc46aba8bea17a93250091b9f4df953b1bc1d

  • SSDEEP

    6144:EmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:DHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 5336-783-0x0000000000610000-0x000000000064E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections