General

  • Target

    2080-321-0x0000000000A30000-0x0000000000A6E000-memory.dmp

  • Size

    248KB

  • MD5

    7c0d0a232984d4670a5fc9efc8fd7037

  • SHA1

    2353fac89e176f77f12a85a7b7ada4bf09bc0033

  • SHA256

    757ccc269a1f7733d2a73cfcd32d1acd691e3208020f8b97a77ca5c7c5d6422f

  • SHA512

    47844141a8480e3d184649c80fa951e2f78e02c0fb4401139023dac90cf1205969fa6c8104eea237de03a445864abc9bd2deb3bf86209a4bf2f05ad793a910b7

  • SSDEEP

    3072:vjJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd2q:vjJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2080-321-0x0000000000A30000-0x0000000000A6E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections