General

  • Target

    2600-255-0x0000000000C60000-0x0000000000C9E000-memory.dmp

  • Size

    248KB

  • MD5

    a8c68a8973396a0ed1026f66cfeddf02

  • SHA1

    a14881d293832dd6a608f558e5b5d76af191c2df

  • SHA256

    f6f9edba1988345ab8b001f992ef5904e2e7bc887d095811aad61ba96639b88b

  • SHA512

    cab030aa504aadb9efdeadc359438ce8b801fbe64459ac513bc1b6663765ee5cd6ca6fa00d3492deca56d1f5b6f77a9e36f2735592714449ed5ddb267f6d56a5

  • SSDEEP

    3072:WjJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd2R:WjJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2600-255-0x0000000000C60000-0x0000000000C9E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections