General

  • Target

    1336-492-0x0000000000AB0000-0x0000000000AEE000-memory.dmp

  • Size

    248KB

  • MD5

    1e86bdb674de0b228fa15f19db4b535a

  • SHA1

    de2d7bf5c793b816c3f1efa1cdf60ac38dfe0950

  • SHA256

    25fbc642849cbc105bbde38d8815e3e4b2c30539e40560ad0a67bb62535122f2

  • SHA512

    e31b94492c05eec1f37a7064d7462ef558bab928d846af67c099ceefc0567c4b1dd70eef1017ec7d7757f5738bbc7e2169e747956896e84fc53e129dc534627a

  • SSDEEP

    3072:ZNv0S/yQKnhNgcoVQqw5TmJOXkXt/qYJanR1TaiV0VnCkMSm:Zi4y5hNgcoVQJ5n0d/tanR1aQ0VnCkM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kolyan

C2

77.91.124.82:19071

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1336-492-0x0000000000AB0000-0x0000000000AEE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections