General

  • Target

    1056-206-0x0000000000E30000-0x0000000000E6E000-memory.dmp

  • Size

    248KB

  • MD5

    a3de163b960a129d8f58a0d7a51def33

  • SHA1

    d3f4f09e1242e1eba3b03fb28c3de5b78f486111

  • SHA256

    14693fd92866ecc0f82e2936f0acf0f2eb0cf57ac05a23002dd4c1dd934c2e0f

  • SHA512

    dcf776873102ccf63743a6ff0ed27b7a95ae35af3725761ab11d4e6b380bd86bd9b4ed999e168d2bd7801f98273bf09fbfba615860169f7c6d624324fbee7a40

  • SSDEEP

    6144:EmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:DHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1056-206-0x0000000000E30000-0x0000000000E6E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections