General

  • Target

    2044-983-0x0000000000890000-0x00000000008CE000-memory.dmp

  • Size

    248KB

  • MD5

    9e94f9248d3f8fcab5a3f6ef1d1957f2

  • SHA1

    b7726679ad405242e4209667f80951cd52dae01d

  • SHA256

    b154355a486c71e8d738d9269ab6058cd8d8eae7aa3279ebcaf0e1c2c7f95f77

  • SHA512

    25989e6bc6f66bfb32a11d8f2a5497c3ded2629798154bf6b4e51827366de49f2b48fbdc3502bf4d2e7a2f25193b9b1981d52ce3a4d5aee8e4de52bedb3136ca

  • SSDEEP

    6144:RmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:gHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2044-983-0x0000000000890000-0x00000000008CE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections