General

  • Target

    1960-139-0x0000000000290000-0x000000000031C000-memory.dmp

  • Size

    560KB

  • MD5

    dbf2faeea7f3c23c954d31b18ba78539

  • SHA1

    27ad0bd4861b65535fe7887caa238f5a766eaa9c

  • SHA256

    7556c11f5ac39338faaf3a709f13d69c72e89e3b501a72c3242e8a9164779c77

  • SHA512

    017effc045ecb2a2792e7769917c7f22050f892b48e31fa88307103bcc5af161b08ee1c6b5886291d289b540c0efe8efa5b7c803ca49dc77d554441df83139da

  • SSDEEP

    12288:B0CJ+2+ziLOsGQ5oMQ1klUfBgGtaTuUIETQN7vM6L:BxJDYL8oMGk+5gYaTuJL

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1960-139-0x0000000000290000-0x000000000031C000-memory.dmp
    .exe windows x86


    Headers

    Sections