General

  • Target

    1940-1111-0x0000000000820000-0x000000000085E000-memory.dmp

  • Size

    248KB

  • MD5

    7e4693c6a46f0308be4ab61655c1e28a

  • SHA1

    18b5810c604bef3f670563b7d2c9f1dc07a95113

  • SHA256

    187f5ddee7401add5f33c7aa674b9edc78b1bbd7f05b081a93be7818355e4073

  • SHA512

    a9eca93433e8e600cc1d13d400047916c37b4f886c83ae0469ef0d16b3bc0e5cd1025e47c3f9055674c91d35f7e959d23520161c47f31bdcc74ad7719137956c

  • SSDEEP

    6144:JmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:oHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1940-1111-0x0000000000820000-0x000000000085E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections