General

  • Target

    580-139-0x0000000001E40000-0x0000000001ECC000-memory.dmp

  • Size

    560KB

  • MD5

    bbdb58c38627b4eee99c5da51b9a8a88

  • SHA1

    570a4735c343bc7763ea9db99b8cfd6c7e938816

  • SHA256

    dbf34f84a4bcf87a84950d4d950005d411c55e14bb97456335c7d1fb57b40184

  • SHA512

    1b0dfceb23655ce8197977d4d244b2d6f34354a3d0c3785e8084591069d81b856e352af02a8cbdf58d3a042c2c02998d96a959e5c841a043473b993801f6ce6a

  • SSDEEP

    12288:XZ6UktMaFUAPI6g8j5dkN23C7EUxDWpOpW5HLeSXz1o6hQq0Ro/hz:XZkGupj5dY23C4UxSOQ5HLeSXzhz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 580-139-0x0000000001E40000-0x0000000001ECC000-memory.dmp
    .exe windows x86


    Headers

    Sections