General

  • Target

    1360-1182-0x0000000000ED0000-0x0000000000F0E000-memory.dmp

  • Size

    248KB

  • MD5

    0a3e28e2814e9d4b0642d5c643d3738e

  • SHA1

    33d9142b29aa17f11d2cae7731bb587137f8640f

  • SHA256

    c7c0ba8c2cb40a7549a75a5a416a3fdb370597777ef054861a273612b3247985

  • SHA512

    bd3045b93923df27b6b4fbdc3eaf98b6811ce56fc118ef877352b50d0073460519bf06e727f44edf33dcecc83b5dc7c883f5bdb0d8d9be657375c92b34a65193

  • SSDEEP

    3072:njJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd2c:njJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1360-1182-0x0000000000ED0000-0x0000000000F0E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections