General

  • Target

    1524-227-0x0000000000160000-0x000000000019E000-memory.dmp

  • Size

    248KB

  • MD5

    03a3927a3d08a09e4a4241bb9e640975

  • SHA1

    f39e3959e7a237bf5d6b319a5cbf492f3637f259

  • SHA256

    0b4d22eef5cbf7798523eff10e43ad976f3fff63e95e0fe039b07477f9a2e718

  • SHA512

    36dd26862d002d3e9f917749de5c3df6ed3651e210bb6be8ea91a5d06e9b195bad1fb7b73fa3ce9fdf0c99aca53f74031e4d10bcbed21719d2b566d731b0e5f1

  • SSDEEP

    3072:4tJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAj:4JMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1524-227-0x0000000000160000-0x000000000019E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections