General

  • Target

    2624-665-0x0000000001060000-0x000000000109E000-memory.dmp

  • Size

    248KB

  • MD5

    28181746243ccc21832309ac0acbcf02

  • SHA1

    7f828a9fc804b732de08975a87aa3b758b128c5a

  • SHA256

    fcfcd4bd39b6dfe2119f98505c373a6940cf7f5f374aeb86d13d6b9f5c6d0f84

  • SHA512

    70ff62d75910ea0b98a4b983f735f329413405e68e6c8243ec6a0dc778099edf6ed474105e67a6032a47176e1714212e65c46488117572457c85679927d9172d

  • SSDEEP

    3072:UjJsVUnYNgcDTrB2Sr1DDfNt/qOWGkHCfbLCdrUd2w:UjJsSYNgcDn4SZDzH/oGkHCDL2rUd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinder

C2

109.107.182.133:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2624-665-0x0000000001060000-0x000000000109E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections