General

  • Target

    2080-1011-0x0000000000EC0000-0x0000000000EFE000-memory.dmp

  • Size

    248KB

  • MD5

    14c1dd0e57f134c4d3e30416988532b9

  • SHA1

    7e2edc76fea78613d143ed2994793ac87be311d6

  • SHA256

    f1762e6d4c4a421cabe808b3f4ed58194385c47b4a4d5b20beb1c58df94d27b0

  • SHA512

    f7a47c3a544c17a6719a6fff1397ad9b8852be23a2114a2483edcce8096082dea340be8ac93c20428eff15668a05b00319d5fda32c37cba16c6feac52cb02ad0

  • SSDEEP

    6144:wmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:nHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-1011-0x0000000000EC0000-0x0000000000EFE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections