General

  • Target

    1252-486-0x0000000000EB0000-0x0000000000EEE000-memory.dmp

  • Size

    248KB

  • MD5

    f5356fd701483f7d712c30f4320a67b7

  • SHA1

    689b1744ac030535a4801caeaad7c47ddef67e82

  • SHA256

    ec5b67f0b95e2d51db81561dba1d200b9e4d2277d328fbcb1e3e8dbc0223d8bc

  • SHA512

    5b321600e0924783d2a90ce31ae3c5863d68b35d337eb7f499f62cd85110593efda1ca0a08b67b13e222a5ba80f55c7001f5c9793918d1f3fefdc6396c4a884d

  • SSDEEP

    3072:htJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAc:hJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1252-486-0x0000000000EB0000-0x0000000000EEE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections