General

  • Target

    2760-301-0x0000000000950000-0x000000000098E000-memory.dmp

  • Size

    248KB

  • MD5

    98956195a5513e840743aac51be243bf

  • SHA1

    3d2e00664ab85514184079000484330cbb5e6745

  • SHA256

    66093270df9e06a4997bf0f83ddc4742268849811c44359d1303e9de78681256

  • SHA512

    84ba4a906a73d419337a9abd58fd262ae0ec52f093af8230251e462195dd217b336f3b07d53d3b1f84da9cbc2e6f176fed4a6bbd6491a9682d0e915e8de0a177

  • SSDEEP

    3072:3jJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd2U:3jJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2760-301-0x0000000000950000-0x000000000098E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections