General

  • Target

    2036-934-0x0000000000140000-0x000000000017E000-memory.dmp

  • Size

    248KB

  • MD5

    4ed672e5d581e4d95e13469d2f3c11d9

  • SHA1

    da639ddba6a39654501df284011e8ab880e51292

  • SHA256

    35b53377ccd8bfec9a9dc73bac860f9cf74605555f3fa724761891b1e8349401

  • SHA512

    e7e2dd7b493d3a1d5625e3ca7a5e5aeb93b0a2a747b8eb3abd6bc551d75cffa379ac58e0b1a22e623588ce4173ae179f41fc8e6d6cb641b5d6e3f25646c839e9

  • SSDEEP

    6144:RmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:gHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2036-934-0x0000000000140000-0x000000000017E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections