General

  • Target

    2644-382-0x00000000010C0000-0x00000000010FE000-memory.dmp

  • Size

    248KB

  • MD5

    d50751a533b06bb8baee0a42d3bfd5ff

  • SHA1

    0b6e16d9ad7a37a48a1f1704873d6d692399e900

  • SHA256

    ffc9b38e4b28eb2d5abb1e0570e78b1fa73c2b66918a807ac0f6c4a4f6fc9eae

  • SHA512

    658a3dfde01a4a45043361f32b1c3791a0340eca94df5166b277a7f5b3dc62d472ef7fba5ba6f7556dabb64de359bd54ddf15a023e6dbbb0fd8199471118f3d8

  • SSDEEP

    3072:mtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAk:mJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2644-382-0x00000000010C0000-0x00000000010FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections