General

  • Target

    2968-264-0x0000000000CA0000-0x0000000000CDE000-memory.dmp

  • Size

    248KB

  • MD5

    5453fa0c4d6c5355271a7c5dc82d127f

  • SHA1

    448afd67dada08edfeb7d4c7cbf2992fb21a5311

  • SHA256

    baba1b405abfac5c5c9c799492a9e9098c841ecb2b59564d0c388b44454b9364

  • SHA512

    f233510815123dc9ff66ccaebe243b167d300d91dd97e669fc2e2dbbca1403811d8cd2c05d58775effc26cc550bd441014f8dbb0e3898a8bbe451ae9309f684d

  • SSDEEP

    3072:MtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAn:MJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2968-264-0x0000000000CA0000-0x0000000000CDE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections