General

  • Target

    2108-450-0x0000000000C50000-0x0000000000C8E000-memory.dmp

  • Size

    248KB

  • MD5

    b2805acb1f5dfc08e1f8775b1871eb26

  • SHA1

    9a47f6bb8ec0b00bbb811435e9fc2c0902974f0b

  • SHA256

    0b4255acb18b889acb98965460e52946c7f4f1aab416bb26b16fb2c307a620ac

  • SHA512

    669c6cbab43a2bf88391344c1100951e4159315e4555a47df55e2407c674f89c7e1b91716b7bf28e8b07c199b64f3d12b72c61538222922233c8f17baadd8254

  • SSDEEP

    3072:/tJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAi:/JMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2108-450-0x0000000000C50000-0x0000000000C8E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections