General

  • Target

    2504-229-0x0000000000F20000-0x0000000000F5E000-memory.dmp

  • Size

    248KB

  • MD5

    6e8dcf7f86ba5f96f29928d636b9e73d

  • SHA1

    945a318784978c67015a7f7cff6d95192722e44b

  • SHA256

    83df44f43f1184a6d70913051e73d95e322464453cc600ee252dd083a9cb664a

  • SHA512

    ca29a37382124ecee0795b777c1c473a9e87fefb74a2c9a7e86f651678b792f09ad32f94ee520ecda6a55f370e3c22ab3b650462c87d439c2e59b5d7a0403a86

  • SSDEEP

    3072:DtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQA/:DJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2504-229-0x0000000000F20000-0x0000000000F5E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections