General

  • Target

    1536-837-0x00000000011D0000-0x000000000120E000-memory.dmp

  • Size

    248KB

  • MD5

    fda24013978b734646a9b2360939f1ae

  • SHA1

    26499b15cc7ae47ac3673cfc58e9139f2357d689

  • SHA256

    fe9896d649db51c637b5c4d2cb81e02ede93c0efba79eb5a5158d142f12daa2d

  • SHA512

    b1831c1e3192e6d12a5e4c7cfc3eb69fb64dc1679ca5020540bf0159620752caed5826ff7affbe0d52d8fa34a2691c3e363e22b3297b87728ff60550cd05caf1

  • SSDEEP

    6144:DmSQQNgcPf2iHv0+9JR/xadbzBNFygk5:KHQNgcPf1JROBNFygk5

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

kinza

C2

77.91.124.86:19084

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1536-837-0x00000000011D0000-0x000000000120E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections