General

  • Target

    292-639-0x00000000000D0000-0x000000000010E000-memory.dmp

  • Size

    248KB

  • MD5

    09a55d31bdd256a87be274c17f6cad35

  • SHA1

    1dbabecb4fc3f0d752c684b702e92e2692efd7df

  • SHA256

    e640617451240dc16b6953bdddc77028de4c84b85769b47e5844f24f287ecfdc

  • SHA512

    72d85e2232ac169a0452490faad2a0748186d994791e0b15f69b16e5c36fba5405f887bac5c9423dacfa878ad87714b6021c5e5e6bcf341ebd7ce5dff952ec96

  • SSDEEP

    6144:7mSQQNgcPf2iHv0+9JR/xadbzBNFygk5:SHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 292-639-0x00000000000D0000-0x000000000010E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections