General

  • Target

    2680-918-0x00000000009C0000-0x00000000009FE000-memory.dmp

  • Size

    248KB

  • MD5

    0dfec924decc83f3f90a40d69ba9d1a2

  • SHA1

    7d57e79fe022cbb2ca1de2df76c12430183c0f3b

  • SHA256

    ea46baacbb085255c75b50e290e3f22da22bd04d0912f6f32046aa7240443ec4

  • SHA512

    f088d871709d91f0d0df165ccfea5cb6de4094b032a78835b4d599c052fe6e99870633d79b229a9ff11cdf7578500c0e08631eaaf8c0006f9088c8676b7e277f

  • SSDEEP

    6144:QmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:HHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2680-918-0x00000000009C0000-0x00000000009FE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections