General

  • Target

    1764-946-0x0000000001120000-0x000000000115E000-memory.dmp

  • Size

    248KB

  • MD5

    3b1260e0f382944415de03c5c7238bee

  • SHA1

    6e3393b5b5b2898d22cc00a71ddc0342bfb5e03c

  • SHA256

    cf337b8c9e689f044682dffecf71b86e9b9dd09413f5e1a7698d13eb3e6c4b8b

  • SHA512

    7a436aa06d12d30f72a1e4477992edab96d565518ce8a11e8675f236ea4a0cd72ac848ec099f778a2ec5ea360f0f33e4cbe2d4a7d0475c7ecbf3c76164313cdd

  • SSDEEP

    3072:/Nv0S/yQKnhNgcoVQqw5TmJOXkXt/qYJanR1TaiV0VnCkMSE:/i4y5hNgcoVQJ5n0d/tanR1aQ0VnCkM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kolyan

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1764-946-0x0000000001120000-0x000000000115E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections