General

  • Target

    2084-695-0x00000000000D0000-0x000000000010E000-memory.dmp

  • Size

    248KB

  • MD5

    6221eee8bc25bd4836a2bf8ad8ed361f

  • SHA1

    7af9b1d67c1174d21df016e6d9643a4e84cad0ee

  • SHA256

    7151d6d8f2277c36d19466e98cfbab13142b790c73faa14151178240c43dd407

  • SHA512

    1b243b56183b1d3c4c5dc6a52cb82dc0eb0de180cdb3f878b443d50d4a8788cdb1ee44b02bf16ce6b1d536cb90f699a85a641fe57bb50b3e581fe5aad8b8ca9a

  • SSDEEP

    3072:WtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAa:WJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2084-695-0x00000000000D0000-0x000000000010E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections