General

  • Target

    2600-114-0x0000000000480000-0x000000000050C000-memory.dmp

  • Size

    560KB

  • MD5

    d7315e034461e7bd1791d9fde22dad39

  • SHA1

    264fc922997b255c7d047145c496efbc8feb554b

  • SHA256

    f6b3606fd6ecc64b27f3f36349627884a85b606e384afda100e39dfbd861a373

  • SHA512

    51c41da925f15726c8c84850ccd1aac1e3146776c3ebe38dc2d08c78029867a7ac42c52e7cf34b05908dd682e37f40f22e33c9a5d555961c72b2d0290183f6ce

  • SSDEEP

    12288:7sqLkBrJ9VWFmxMlz4Sjz9hp320KbWPi3kEVbgTXmQ1iGMMY8:AqLAHilMSVqbLkEV+Y8

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2600-114-0x0000000000480000-0x000000000050C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections