General

  • Target

    2704-141-0x0000000001E50000-0x0000000001EDC000-memory.dmp

  • Size

    560KB

  • MD5

    5bb804f2a6b9be1ad46afbc3b262783a

  • SHA1

    5c27b84064b8806bc50dd732227aad64eab4b23a

  • SHA256

    659e8b51bd57a98a19d37ec3b320b4c59f4f0566f14b57b9284b68f3a66013bb

  • SHA512

    379c5b2a20dab4d8cc4737a4b425b90653d13df04f35ed06e06159ed568e1b522771ba239a475e470c95d37848dc6683e9307811be71c5b12dee8693eaa8eab0

  • SSDEEP

    12288:l0fLdzLKueVpbovVK9ip2C4UCBBMKPPmo72gqKSkAVCQ6Gv6+P1w4:lKLN+PmVLIbB3PP5GP1w4

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2704-141-0x0000000001E50000-0x0000000001EDC000-memory.dmp
    .exe windows x86


    Headers

    Sections