General

  • Target

    2784-968-0x00000000011B0000-0x00000000011EE000-memory.dmp

  • Size

    248KB

  • MD5

    3e68d3abd502ea90abf96fae27402ad4

  • SHA1

    f0734fc61e43630a801eb3a7151af10fa205b068

  • SHA256

    48afff51fa5e39560f687537cee9129b1bb82ffecd581b869c4e6963deddfec5

  • SHA512

    070e13b091076a6a8d9994d1e638e5a74ad0db8889195d873b0dfa055a68ecf69d53df7369bc3afbba941c29a5e2418a28956a140ba1267a2039345c9c3fe3ae

  • SSDEEP

    6144:6mSQQNgcPf2iHv0+9JR/xadbzBNFygk5:pHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2784-968-0x00000000011B0000-0x00000000011EE000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections