General

  • Target

    2168-985-0x00000000009F0000-0x0000000000A2E000-memory.dmp

  • Size

    248KB

  • MD5

    cc9456d9220685cb943cbe7f97a9bbd1

  • SHA1

    8a1aaabb20251387badbaf581121e69aeadff5fd

  • SHA256

    8d3aa74d1770ec875b3abf88dbb8045e310f889538bc33d9c775aac809c4ae81

  • SHA512

    e47a74ae37e864aa05911d6b8e43f57bd74f3a81fa5db19e08bbcab0ac9ea90aff326fea63768b843477c4b3ecb077fba8e8cbeeabc6d8f7300321e297d4a16d

  • SSDEEP

    3072:JjJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd2O:JjJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2168-985-0x00000000009F0000-0x0000000000A2E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections