General

  • Target

    1528-323-0x0000000000E00000-0x0000000000E3E000-memory.dmp

  • Size

    248KB

  • MD5

    86737118ea916d44a6f38d9e4d274eea

  • SHA1

    3bc71ab145ec2b0f73719c886ac4e6558ed4ece1

  • SHA256

    9a18c1cd9f8afa9a56cf0723259680e9fac788cf8b671872a37b66e34aacfdc7

  • SHA512

    deee25d24d95da18297bc70cc4bc604a38f6678880f6738940ccaf783ad453d1788fa20665f1ef9c929593f6fcfd243ef0d35e9fb50d6b3c585c41940547e182

  • SSDEEP

    3072:ONv0S/yQKnhNgcoVQqw5TmJOXkXt/qYJanR1TaiV0VnCkMSn:Oi4y5hNgcoVQJ5n0d/tanR1aQ0VnCkM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kolyan

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1528-323-0x0000000000E00000-0x0000000000E3E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections