General

  • Target

    2892-93-0x0000000001E60000-0x0000000001EEC000-memory.dmp

  • Size

    560KB

  • MD5

    d59f17f83617add9ba32cd4eb0bcd988

  • SHA1

    3ba059d465d387ebe9d992d881fbbd092b342e62

  • SHA256

    78f1e45fc3094a3f92df22b37b3612e3d1de228b0f69a03967ee195fbe5eb4fc

  • SHA512

    27acbffe3300744fa3bca5ebb820d9c9af83ced53db4e0f6bd261f3bbf84263148f951365b6b0501a56bcc70026a26021b2c0432c4c7d5fc0eecfe93d2ff73c8

  • SSDEEP

    12288:1Zoy6UzG4ODT9XP0tAym6jax9kGWcD2QxmJJLBz:1ZoyA4ODpXeAyax9kvjBz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2892-93-0x0000000001E60000-0x0000000001EEC000-memory.dmp
    .exe windows x86


    Headers

    Sections