General

  • Target

    1252-1177-0x0000000000170000-0x00000000001AE000-memory.dmp

  • Size

    248KB

  • MD5

    3a63ba50b2ce7642d9da688d241f10c3

  • SHA1

    1d53121be13355531167e3c1bf98565085a4840f

  • SHA256

    1392405da66e9afcf76421524e0bfe228a6cc8853154c66652172a5c6e4507fa

  • SHA512

    c162e747f018f3368490a31af508397d721643cefc736ac0079a02af054a1224fa960694e78eaa4c022c2d3bff12c9b0f09d8fa03b83b4fba7ba2e4f85b823fe

  • SSDEEP

    3072:EjJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd22:EjJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1252-1177-0x0000000000170000-0x00000000001AE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections