General

  • Target

    916-312-0x0000000000040000-0x000000000007E000-memory.dmp

  • Size

    248KB

  • MD5

    9753278b2e6455a9e0552c206440d038

  • SHA1

    96bb8c75ffdd05391810a1d70afec5119e79bc9e

  • SHA256

    4357758db91e6ae8c2843b18ec52b35d63fc3a9f7ac6784d9b71dfeb98034d10

  • SHA512

    59eebe4438a82f1c1b9e7f96a72acb8661bfe4f51ec469dbbb87aafe210c86dd9dc227fedd5ade69c18eb4f34af1a29e25f804df510727364f2ea39c03810dcb

  • SSDEEP

    3072:4tJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAt:4JMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 916-312-0x0000000000040000-0x000000000007E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections