General

  • Target

    2Gy405Bt.exe

  • Size

    222KB

  • MD5

    0e207392a199f1e700fb5da0114103ad

  • SHA1

    cb6f90969f9138ed5989c133c8af8f5a85b2f97f

  • SHA256

    1c2e510f88ab7aa0dd0d4f9ec9d265beba64cba5b6302f339af53f8d3fb51c3d

  • SHA512

    aa8cd4c6e7f40a310e490c3dab20bbdb370b5cba7fde86511449c5971161ceff01fefed76090dcd40d270c66cfac8ae912c84f1f4852b0c5010566ed48744130

  • SSDEEP

    3072:TtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAZ:TJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2Gy405Bt.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections