General

  • Target

    2856-141-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    131620d33cfadbbbe6347e5f3ae82827

  • SHA1

    5e3eeb0afecc78d2ddc8b2f8a93bad28e1b8c708

  • SHA256

    5706bc965f2670610ee8ecf8eaff105d53f53e756541f0276c245679d9e5a92f

  • SHA512

    3e318cf90919768c72df33f8202c9c88fb65b0f49b1b91853b0cbc5db220a64c33c8cef731bb36c6050d0e2242a9a5ed938fc578d124486481b6911c1c090c7c

  • SSDEEP

    12288:ThOoFqFfuOX4NqVjhTdiCnv3GFK0OTDFiY6mZ1nSeHQex/4No:TqQOX4OX/PGFCSmZco

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2856-141-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows x86


    Headers

    Sections