General

  • Target

    3008-94-0x0000000000310000-0x000000000039C000-memory.dmp

  • Size

    560KB

  • MD5

    b470d0b8a1a622cd168409d88f595a65

  • SHA1

    05358407dfeb0a94755b2eca2d31954a0e11e367

  • SHA256

    34e16b49795c95b515b232d8636981bed28407f12e4268927373602c6c04d178

  • SHA512

    156da1d5addd01c5209f3ec526d4a0fca736064a4fb9c6e15789528b70288fe94b0a956e6a25a00507ae336c510dd06dbbd6a71b144e5410e063e3a35b04dba4

  • SSDEEP

    12288:f9F2Q/w8jA/VklwwYfB+Vhj0TNROrmvpXPsd/wE+Qc5X/5q:fP2w21KVZQvpE0q

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3008-94-0x0000000000310000-0x000000000039C000-memory.dmp
    .exe windows x86


    Headers

    Sections