General

  • Target

    308-421-0x0000000000BC0000-0x0000000000BFE000-memory.dmp

  • Size

    248KB

  • MD5

    bee85495f69968665394bf92da41b783

  • SHA1

    afad336f9e6555e91ff22ee08d5e56a014d36ffe

  • SHA256

    421267ae39ad93110bdb461b069b410ce11cd59009a6ca6cf922e2c5cbc51717

  • SHA512

    57ab0b6d08cd8ab9da962e9b2183707217e02f4130c494beef31e0fe50082786874164d643edd2a036c14544ec514fe9b70e049df51527844c7172102002c975

  • SSDEEP

    3072:uNv0S/yQKnhNgcoVQqw5TmJOXkXt/qYJanR1TaiV0VnCkMSr:ui4y5hNgcoVQJ5n0d/tanR1aQ0VnCkM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kolyan

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 308-421-0x0000000000BC0000-0x0000000000BFE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections