General

  • Target

    1776-322-0x00000000009E0000-0x0000000000A1E000-memory.dmp

  • Size

    248KB

  • MD5

    01d12ba5689440892ba859721621229c

  • SHA1

    19cfd695d64ed48aa902088c9d470c74dcfeb91d

  • SHA256

    daaa3c6548de78dae3eccc7672980a3529f5724b5cd5e08ca16f68a5363c927a

  • SHA512

    313c32cedca2aded8d95cc1caa957ff97a18c7d966a54d22b5bc3bb91dc4a4e928cedc4956a1582cb42dfd463e3a39dc8d07f0f20136d5273244590f4a8887aa

  • SSDEEP

    3072:xNv0S/yQKnhNgcoVQqw5TmJOXkXt/qYJanR1TaiV0VnCkMSt:xi4y5hNgcoVQJ5n0d/tanR1aQ0VnCkM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kolyan

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1776-322-0x00000000009E0000-0x0000000000A1E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections