General

  • Target

    3020-131-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    f1b6f47db31f0b0f2bd724aa2d057498

  • SHA1

    8c0309f136f484cbcea643c9e8aa1e4c5daa25c8

  • SHA256

    8d42c82d6a0f2e1e061b0d09e9d05617bee3cd1331bee11c0884f6e34ac0e690

  • SHA512

    015795431f1f73088ba26e4873aacadfdf4c724c8682d2a904ab04d60002e89eb00fe5520095103588efefa32f0890910be9c2d71365591decfb7e8d2788ad94

  • SSDEEP

    12288:GO5FfuOX6OnTPCAD50XddOSpoNOOX4CfVD3Z1e24Yv6QcTXH2:GO5QOX6e/NsbQD3ZE2

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3020-131-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections