General

  • Target

    948-142-0x00000000004F0000-0x000000000057C000-memory.dmp

  • Size

    560KB

  • MD5

    400744e9b73773ee99277ae6a34aa459

  • SHA1

    ab5f28207618249960ee4c8c0585d3f2119c5381

  • SHA256

    99d4188b3816c485112731ef53e7a7f5a26e550e46b977442ef2024b087eb47c

  • SHA512

    6480f4a6ccc11c9a26ecec4f691cd25c82dc22032271b0d6d2af375de8d8344eed4a2ecbceb22ad7f3bf06be60653f2e90a5a57072c648c46e8c1f9c08234d86

  • SSDEEP

    12288:0ofQTXC/4lc42hoEYPjsJWj4qxWggMHHU7AajDKQCZqKW:0of7Bb3+4qVXHU7ADW

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 948-142-0x00000000004F0000-0x000000000057C000-memory.dmp
    .exe windows x86


    Headers

    Sections