General

  • Target

    3012-222-0x0000000001030000-0x000000000106E000-memory.dmp

  • Size

    248KB

  • MD5

    cfbfde3ece7e04c0e5d4d6f146846e2a

  • SHA1

    21fee973d2c340b65f995cf855e7613e646a7df1

  • SHA256

    98af322bc22e4e54b2b9ee67997fc639cf2a845efb0fb831ec10b402ef8df7e7

  • SHA512

    7fc35d214b6aa80f24bf75433c89c095cb28bda0f93fbc7c20a74861fe511e1d928f1046b6913f2945f5ffd955c7cf9c1eaadce3830af8f74882a604afa9d9f1

  • SSDEEP

    6144:DmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:KHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3012-222-0x0000000001030000-0x000000000106E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections