General

  • Target

    2300-114-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    bbdcdd762a8020db16fe17460b8c0e80

  • SHA1

    3e4eb4481038a93c8ae98b4bfb686c796c427914

  • SHA256

    07b04fd0de3962e447ba8a876ac9de56ef987dec721f9bcc2e142ff394b6bfd9

  • SHA512

    fe28053c4950268bb77d7de31083e859fa9d0e75a80d42a3260972b61c3d4c0a78ce48333d3f43b8d0cba19d51919294806f9b31efa82983205b0b1cb7f45fa2

  • SSDEEP

    12288:to+TN5eZGxfuNoMSDG5Uk7jCS1DU2r4dhfdsQrLip3alY:to+JubUKjzDU2r4dAalY

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2300-114-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows x86


    Headers

    Sections