General

  • Target

    2160-93-0x0000000000360000-0x00000000003EC000-memory.dmp

  • Size

    560KB

  • MD5

    d7fff888f4215d68cc20e501fe45e1eb

  • SHA1

    a35dbf19b13bcc2323724f742ba35b1591cc342d

  • SHA256

    e0b6a88284f4e9e0f63b1d46cae738bc8689c7e04d3db3c24190d026a2f77b87

  • SHA512

    948053e5e73934ab9800297debad1daa1cb7eff0663a16df07720016ead43094376d04e5ed104d55ce9a9a63cf6900ddce53851d6c219a383ec36f6adfb93dad

  • SSDEEP

    12288:pWe4sWsHS+E1xPc2t59ffXZB2bwakfUwQ5C/Oc3y:pWRs37wPc2tTPZi43y

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2160-93-0x0000000000360000-0x00000000003EC000-memory.dmp
    .exe windows x86


    Headers

    Sections