General

  • Target

    1592-598-0x00000000008A0000-0x00000000008DE000-memory.dmp

  • Size

    248KB

  • MD5

    2a536f625edbbd6cc955ecb08c30c2d4

  • SHA1

    f97bf0744408b724af8547069c244dc77300e5e0

  • SHA256

    31baee2cd0d0c29e9f6dd1652581c54c260feedf841fcbc090f9d1a0d96c69d2

  • SHA512

    0f0f6c48ef72f2804079aca0932ec595575b3c83c8478ae5ef5ecb2b0be90d056fb2f1e038ea34174378361e53d30d533f4e21ffb9974dd4e58052b21eda2143

  • SSDEEP

    6144:tmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:0HQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-598-0x00000000008A0000-0x00000000008DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections