General

  • Target

    748-288-0x0000000000BC0000-0x0000000000BFE000-memory.dmp

  • Size

    248KB

  • MD5

    45dbd137d11fadf55062af244e278904

  • SHA1

    67771747afebdddd88de1310081726adb967737d

  • SHA256

    40229c609d9450376c464ceaa08afb11e5018b1f9a11ba60cc3a250d91c25729

  • SHA512

    2c4f4354415f62decbda754749d834fefd6c84330bec2d05fc38e291568751d467890f2412e2c71893037120ae5964549867e970994488be6fbc9339c1cdb01b

  • SSDEEP

    6144:cmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:rHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 748-288-0x0000000000BC0000-0x0000000000BFE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections