General

  • Target

    2712-113-0x00000000004F0000-0x000000000057C000-memory.dmp

  • Size

    560KB

  • MD5

    09f81d3641cb5d3b9beb7746b802dea4

  • SHA1

    fe526d3eb7f87041c79bd4f76b137540742410cf

  • SHA256

    a9333a9474fff4e907cc6de1423f0f43c228ff37663f52201a1e5deee8dfa920

  • SHA512

    22b370a6fc630e59e62d16c74d367036b1ece105f7bdcfb35999bbbbbe193c27f9cb8fafb420219bd47ebcd4617916440711bea66027673c0e52ecf7868ef5fc

  • SSDEEP

    6144:ZqSs/hqm6DDOu/YaKVFNjyRTulJHR/2qUrz9TCWRbn87wMqCVFl+ftH9NU2NYHo2:ZFsJq7yxfUrBn5UwCavNUVoBQJv/Uy

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2712-113-0x00000000004F0000-0x000000000057C000-memory.dmp
    .exe windows x86


    Headers

    Sections