General

  • Target

    588-730-0x0000000000FE0000-0x000000000101E000-memory.dmp

  • Size

    248KB

  • MD5

    effadab5dc029bde0cabb72881f85f43

  • SHA1

    e143b7b3919cb24537d85efc1c846a5e3918381b

  • SHA256

    267ee710805ab950c5ae3e95ffaf18d04cc23fd5fc975ff995567df1a23b9ddf

  • SHA512

    1774ca60783f53b9364be7b4fee1f009522f57b8303518f0cba131d6169eb8715963dca8788b83f42800e9e07eb5c80a52784a3b1bdb043f3125697c8865e7fd

  • SSDEEP

    6144:cmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:rHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 588-730-0x0000000000FE0000-0x000000000101E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections