General

  • Target

    1532-1090-0x0000000000F50000-0x0000000000F8E000-memory.dmp

  • Size

    248KB

  • MD5

    927a7d90772d807469a4c63b1913db68

  • SHA1

    74fefbbf392dd1d4b8b512071c8cbae1245ebc5b

  • SHA256

    b4623a2da4a7f10cb67240314cac069e0d050b47e79b690440cd740aee25e066

  • SHA512

    c616e4e79ae81e0f561ee5d06b006c9760e64afe7dfadc11b2fdd833ebc4b462bdd62a559fc94139980f90938b29e1b984c84a0b92e6d517581cca0323ce9594

  • SSDEEP

    3072:TjJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd20:TjJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1532-1090-0x0000000000F50000-0x0000000000F8E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections