General

  • Target

    2604-652-0x0000000000D00000-0x0000000000D3E000-memory.dmp

  • Size

    248KB

  • MD5

    92c34dc99129eb9e2639f7e2bb47dd7e

  • SHA1

    a3a0a11328a70c0dd9a7ce106e372341cb009f06

  • SHA256

    504c371367d87ed8382bc44a5b59169d2e88693ccb311a3c4f87d80486b26a91

  • SHA512

    00de00894260456bee1acfa777b93db945c9712a6a313ae244be1e894dd7dd1ba9b34da25ebb756e04f884793e7de3fa2988817c7243fd1fe509cd3d2ceeb686

  • SSDEEP

    6144:ImSQQNgcPf2iHv0+9JR/xadbzBNFygk5:vHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2604-652-0x0000000000D00000-0x0000000000D3E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections