General

  • Target

    1636-233-0x0000000000150000-0x000000000018E000-memory.dmp

  • Size

    248KB

  • MD5

    a20716c7aad3aaac1c4023ebdb1e59c1

  • SHA1

    ac9beece27e1aecc2a4da1898d27324529b8d1cc

  • SHA256

    102f8f1124d3da870246b367bb4ff6826c7f9c93b0ecc010af060b5ec973816c

  • SHA512

    7be31a76594a20837dbc526ad0bcacaf822116026ac3eeac2a6ae4e17f69020a73ec0806f768f3ae60f93088694c43bf755546c86fa11f7e318bd0eefdc3f4f2

  • SSDEEP

    3072:StJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAS:SJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1636-233-0x0000000000150000-0x000000000018E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections