General

  • Target

    2660-960-0x0000000000C60000-0x0000000000C9E000-memory.dmp

  • Size

    248KB

  • MD5

    284ff02d0cfec030640bdb5fb4c59f22

  • SHA1

    4f4b58f8ec64547f60a4bef1b8bc57e4f62b8138

  • SHA256

    a8bfff16abcffc5de15d7f66a807409f77db804df040e4d8e57384806cc382bd

  • SHA512

    07208fcb1a3731b2fb1620a968506e06578fa684b5e6407ec0e08dd32d2b04192438625abb187ee040a7ca1f72f23cc8808ceced9679f4fcd3b20e5b98e64f15

  • SSDEEP

    6144:MmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:7HQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2660-960-0x0000000000C60000-0x0000000000C9E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections