General

  • Target

    1632-1041-0x0000000000F10000-0x0000000000F4E000-memory.dmp

  • Size

    248KB

  • MD5

    f34f871c322838b6f9a2262afcf150ec

  • SHA1

    4643c2357655310fe782e84573ae6ec4d228e3a4

  • SHA256

    8fa31da10b61d8d3e7d8ea57ff3269cbb8c7f40feaa8f060e65a96c310269a28

  • SHA512

    f98e3402cab079e591517f73ffac9182540c183db1cf931e7896e6c4aa422fe0470e9b79c9a5528557458d878865d051cb91c212236ed69f137a8e7ce46be390

  • SSDEEP

    6144:ymSQQNgcPf2iHv0+9JR/xadbzBNFygk5:RHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1632-1041-0x0000000000F10000-0x0000000000F4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections