General

  • Target

    1600-140-0x0000000000320000-0x00000000003AC000-memory.dmp

  • Size

    560KB

  • MD5

    442c918dd9f698a1e7ca258d2bb2dc64

  • SHA1

    3d3e43dcfaef14245dc61a34d897d8638dd61bde

  • SHA256

    6536bb8d2bde0bf4f30addd07f0b982d9d8fe84dd1915404c630428578d79a36

  • SHA512

    4f176bc1ce1a7835da0a6aa1aa37b3915aadf4d48579bc5b553c6842e5f93572a0b0e6cb68a629a675aee8128c49941d98aa61ebc4b7400a4bce7ae296100b4b

  • SSDEEP

    12288:6jLaMZnANDl/9ITMMPqBgZUqdF+ooQ5ZveV96l:6jLrZnANhVITMAqGZU4Jl

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1600-140-0x0000000000320000-0x00000000003AC000-memory.dmp
    .exe windows x86


    Headers

    Sections