General

  • Target

    2792-114-0x0000000001DB0000-0x0000000001E3C000-memory.dmp

  • Size

    560KB

  • MD5

    af99a3d8dbb57e3b9485a9bebd8492bc

  • SHA1

    661364e4fa35861ec000f944c300ca399c5bcc6d

  • SHA256

    a9d0df4cad4672921f25fefee176880323f4859a3bcd663cb91296cc787c929d

  • SHA512

    e4788c7fb1232380014ab4e4ab168bef61dba0aec20817a519b3252567c5b526ac86697a01e7cfd8e1e9708cba53a1cef46fdb4fa62b41e3af5085981c714438

  • SSDEEP

    12288:ZYjumaSfqq7Jw8veCzjW4IUg0eDLgyvswFoL/ZU7NOoQ22I1Tl:ZYBaSyUJ3WCufU6UwoL/ZUdJ

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2792-114-0x0000000001DB0000-0x0000000001E3C000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections