General

  • Target

    2836-205-0x0000000001010000-0x000000000104E000-memory.dmp

  • Size

    248KB

  • MD5

    b8e832ed43f4f0d54621c6ce12bd89de

  • SHA1

    983938e2ebe7040270ba1e1a00c85133666369db

  • SHA256

    46c038fc022937f3c2c4f7c52f92113b4ad5803036aa042df6f10b5e5a76564d

  • SHA512

    a72c3576b447325b01217707379567192c853a3cb6be41ba861187800760479d9a4068095a4f6a92bb7690d446a8f709899e3be77ddd992e06ea5cb90aa65634

  • SSDEEP

    3072:KtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAH:KJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2836-205-0x0000000001010000-0x000000000104E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections