General

  • Target

    1008-1030-0x0000000000F10000-0x0000000000F4E000-memory.dmp

  • Size

    248KB

  • MD5

    6217ceb9898cab355584e9475ddd7898

  • SHA1

    58b8c70a1bcc4302dfce1e75d0e22a1be06f6811

  • SHA256

    b32ae644fb446ba187314f995d4fec9a4a700188cea6a09068ddfe2645a22739

  • SHA512

    ceb025616f7c1d965f35799478a7a3cf0d4534017072cd46d54aa8f91d631b58e315b50d4ed67b2c8390478ddd305d512329c643bf6bd9b945c8885d01e2f15f

  • SSDEEP

    3072:oNv0S/yQKnhNgcoVQqw5TmJOXkXt/qYJanR1TaiV0VnCkMSM:oi4y5hNgcoVQJ5n0d/tanR1aQ0VnCkM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kolyan

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1008-1030-0x0000000000F10000-0x0000000000F4E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections