General

  • Target

    1300-131-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    9256aa4d8f2e50ac0488bf46051e76d9

  • SHA1

    d6a8a4304ee3a349fcd6a75eecd122d8bb954f29

  • SHA256

    0f8bbf3dde9bfa443db262d0234457402658c8c1c1b224f649baab016a112e55

  • SHA512

    9b538e6fe3e306dbe4e062906799d508cee915076fb9ac874771b236d2e60f64495eb084d716d318dcf8fc3710216a85d60f046355b1b8dd4e14fcb3b4f99107

  • SSDEEP

    12288:pZXzLCDNWPtHGu5Djo3cn4DCTWXgzXR3Qevkc8:pZ/CDNKtm+cMn4DCTWXgzF8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1300-131-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections