General

  • Target

    2872-94-0x0000000000370000-0x00000000003FC000-memory.dmp

  • Size

    560KB

  • MD5

    54b60f3a390f496816842dadef079e26

  • SHA1

    47b22fe3b74730cc0b5515488fdaab84f70d3b2f

  • SHA256

    f5333f9de546253a766d7c122b3b9b03f4422343169354fd09a89f9e337ee853

  • SHA512

    66b9a3cdb6b139b372f2b246afd8d1e4ecaeab9b4771a91deefdb0bb26493ae9f866ca069128b3080b6c62b868c8111b425f5ef3dc38140ad58fba29c4097950

  • SSDEEP

    12288:rzmvWD1LQT2tH1PG3Rhv9ZLvpVoDh1Q5Ih/jbD:rzmvWD5dtH1PKRhvLvpVED

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2872-94-0x0000000000370000-0x00000000003FC000-memory.dmp
    .exe windows x86


    Headers

    Sections