General

  • Target

    2964-113-0x00000000002E0000-0x000000000036C000-memory.dmp

  • Size

    560KB

  • MD5

    48668ee49eb3c08d08e567eff5a9c92f

  • SHA1

    0294b899c35ef2e8d50fb70aa009c160c9b3e4bc

  • SHA256

    7e674c7a25cba53e3b3435185fb0ffd3b2fc16d55215a3a95fea3e7a08085e7f

  • SHA512

    5647a5f6d8f5fdad5de214d8519d4447491d9d8d34284ab719d9c4f49a00007a4bc1d1993184c872bf0cdf5ab6eabe435be42203a1d7e6f4609ebca0ce911b62

  • SSDEEP

    12288:m1zR3JG4rNvwofs9FTYNJSALu0rgMwqovnQWVHYRPM:m3ZnFwofsPTEAAL3gMi0U

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2964-113-0x00000000002E0000-0x000000000036C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections