General

  • Target

    2288-1111-0x0000000000CA0000-0x0000000000CDE000-memory.dmp

  • Size

    248KB

  • MD5

    6e87421cbca8ac0e9e385f638750ee72

  • SHA1

    6345b059a400e85cfdb7fea53b898b23104db9e4

  • SHA256

    2be944a4ab7517b72641ec6b7b81bcc99930bffd4dca978050c3247a5fe907a0

  • SHA512

    5f3a68ea0219355dda4c585412782e056a2cec56f23fb817cbfa76740a3f795b035038b525433bd7ebc7342f5ea556eb9821b34c91d796a60f552c07363a6352

  • SSDEEP

    6144:ZmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:YHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2288-1111-0x0000000000CA0000-0x0000000000CDE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections