General

  • Target

    2104-1005-0x00000000013A0000-0x00000000013DE000-memory.dmp

  • Size

    248KB

  • MD5

    4181918c63e42a07cecde564939ee444

  • SHA1

    c157246dc81e7e1466b70716d99f142eb819aaf5

  • SHA256

    0d7c2b3c04db7062478d3f546db0232d89f3f8cd4c440831de74ee33072bd894

  • SHA512

    1d387d25b002f6abd02d9008d65c2dd607a29feba4d209eff3113daf4d34006bd41d938f4ed5d53f82db6c6b1b29d18712ae6a49681256bec9d982636903abe5

  • SSDEEP

    6144:vmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:+HQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2104-1005-0x00000000013A0000-0x00000000013DE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections