General

  • Target

    2596-981-0x00000000010A0000-0x00000000010DE000-memory.dmp

  • Size

    248KB

  • MD5

    30c4cc9b50ae14cf7c408ff7f26bf7e8

  • SHA1

    7a3a245c635c37e23f2ac9dc7e09db5a621d3647

  • SHA256

    1c77400a34c81f8ea1032335b8d28563818147f872f0fad8ea0026422e856a3d

  • SHA512

    f5f8f25e5a5b80e91c8a0af86d574f57591ba8f1d83637319ce0bcec2afa3128e0a988608d86677c1adf863ee1f1dece4be942c4b984e71f13486b9f6023ffed

  • SSDEEP

    3072:YjJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd2c:YjJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2596-981-0x00000000010A0000-0x00000000010DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections