General

  • Target

    3040-114-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    4e81b35575256d7ea32bbec41df9c41a

  • SHA1

    1d476a5cc50bbb28bccbe47d7acb658c2cdbb92d

  • SHA256

    f20afe8d1174aaa8fc561c4af0a7358da578e2634d639c0dfaf5f6adb137a521

  • SHA512

    f066f9adb57a046ed3d31c12615a302d653028976c4e0f9257cad77bb301761eb2d944bf6ee583295e420d6462ff9d421574069c1bf2def208f13492759b699b

  • SSDEEP

    6144:7NdBsZ/OWRIkxUWE8hZ+wdWQ/i09hJ04evKr8NC+Z5hQEOqCfUdrdA:7+Z1RTThZJri6b09vKr/+Z5hQEOqCfz

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 3040-114-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections