General

  • Target

    836-308-0x00000000002C0000-0x00000000002FE000-memory.dmp

  • Size

    248KB

  • MD5

    82c59830331a8b55d96703bd1e48ca65

  • SHA1

    e8c696296afb930641d25ba4917314f411d448d6

  • SHA256

    f732878e4af231ebad6fdb0f43e69fbc8441113fab2220ef63584ea94255dce8

  • SHA512

    fe492a899a5f78a8e34c08e3e0ad857d8ac19a961b3e5916c30226e5c27184eec56112880677f58807978ec0de28a85cd8327f1cbd60441b09806d3661440eca

  • SSDEEP

    3072:MtJXRMeZYncNgckxQdxCr1d2t/q5yoQVZL53pRzzXZQAl:MJMeucNgckedxCDo/doQVZdZRzzXZQ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kukish

C2

77.91.124.55:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 836-308-0x00000000002C0000-0x00000000002FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections