General

  • Target

    1760-114-0x0000000000940000-0x00000000009CC000-memory.dmp

  • Size

    560KB

  • MD5

    66e38e3446d365c877fe2aca7a777b52

  • SHA1

    e70f0012fd5d9e298cdcc5ec4fa090e868ad281f

  • SHA256

    d9732c9387e772699e0adee4e049035b578058eb9ebe89c7aa6a14f366305eea

  • SHA512

    a27bb6b979accaccf067b57610b8c9dbc14eb694f1aa094fedf5b563529f43811257ed51b97b6b0e63e5890c61a4c03125a9843236c58c2516f175b841decbce

  • SSDEEP

    12288:GpEYNICckTDOxae+h1GzsX7vpRP5/WVcH3YnXQQncrdM:Gi8EkTaEe+CzY7/5eVcHVM

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1760-114-0x0000000000940000-0x00000000009CC000-memory.dmp
    .exe windows x86


    Headers

    Sections