General

  • Target

    1716-94-0x0000000001DE0000-0x0000000001E6C000-memory.dmp

  • Size

    560KB

  • MD5

    b1ceb0a3cacd2b677a05a2fa44302c75

  • SHA1

    f08b770b1b979cdf0eeadebd4b1fd0b0c74af890

  • SHA256

    3a33be5b3aa4416261e4a529277498d48c6b97af151fe3896bb83c230cda37e2

  • SHA512

    6fdd5d977862e592a2b6e3c54d67dc1933911824d062b8bf072d6dc3141339d9aa1d682fbb1fb4cea7f7ebdeb732f7b83546c6d61813220b6f5630f8d257f5f5

  • SSDEEP

    12288:ZiarSCzT7Rh+x4AxdmOBOX4y/P80kzQC1utncd:Z1b7O4AyOIX4y3jcd

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1716-94-0x0000000001DE0000-0x0000000001E6C000-memory.dmp
    .exe windows x86


    Headers

    Sections