General

  • Target

    3004-113-0x00000000007E0000-0x000000000086C000-memory.dmp

  • Size

    560KB

  • MD5

    d6d813808b02b8d8f3e47c81388fef72

  • SHA1

    f000d714d5a1d495de53fdcf7bff12108279e316

  • SHA256

    2765f8279e58382229794494fbc44f66e8ab63b6f3d2fc9a5ee73166e4892641

  • SHA512

    dbbdd36ff96aa2c7695c2f4c1e72a4eb48f65939d504c469402e376e53fe7c0c52e48033a3844929bc6d9f2c6023c2df17dee4231776638d5c1bf1006bd53e65

  • SSDEEP

    12288:IInqWL24pWRm5O8aScIO5TGz3bcpSIA6gypQZTb/Hqy:IcAWSS7opSIAVZ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3004-113-0x00000000007E0000-0x000000000086C000-memory.dmp
    .exe windows x86


    Headers

    Sections