General

  • Target

    2540-114-0x00000000002E0000-0x000000000036C000-memory.dmp

  • Size

    560KB

  • MD5

    143397020da48b157d7e07a125d20707

  • SHA1

    4c80fb45f0a05148eb3d3ecccf3db1a2a8493081

  • SHA256

    2bbd4ee1e6f1cb8f12e5a8ac5dd27023c37905789e1b2866e354278a81f41b23

  • SHA512

    d8afe27e7fc062cf6ff863edbd6bf287859707ed33494e424ed23da758a2e5f941dcc3613af569eb0263d10598dab544c4f4a503105014c43664c2d52e11e0d2

  • SSDEEP

    12288:MqN2I6U8TfEe81A1s907ACfJtgGVnAOPw1l+Eg6peQ7SyOSh:M3IccsH1Y8w13h

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2540-114-0x00000000002E0000-0x000000000036C000-memory.dmp
    .exe windows x86


    Headers

    Sections