General

  • Target

    2852-113-0x0000000000320000-0x00000000003AC000-memory.dmp

  • Size

    560KB

  • MD5

    4a2a7261362c2029421a878c9ff258fb

  • SHA1

    c4e9edca01603c47437e028c02f201dd9c78b524

  • SHA256

    83219ace5187d4cbc221383b3f72494e4361e64af883f53acbced2e995295b5b

  • SHA512

    a1a14d83d026d410c2bcf493096eb533d1fda4891ea768891a6563b4b4edbe58297f4f9f6a9171f6aafd375a82b75b60ceb9baa897c61a9e5f9486daca47027f

  • SSDEEP

    12288:dXMyqWtRoKNX5bMJD4aLSxEVi+MRbWyQlzgBtWP:dXMnK55+3Vi+kE6WP

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2852-113-0x0000000000320000-0x00000000003AC000-memory.dmp
    .exe windows x86


    Headers

    Sections