General

  • Target

    472-142-0x0000000001E40000-0x0000000001ECC000-memory.dmp

  • Size

    560KB

  • MD5

    0cb5d4772b19350fd9b9d2d2a4c54412

  • SHA1

    50ca7a2425af2d3ef500ca3780bdbcf518fef8a5

  • SHA256

    9f250f7810e2423129c9dc0e3c30eb0ef2589d5e517d702e63b41d856b33cf2e

  • SHA512

    f24cb8affe3029c3f2fda3e64ad925a174c6308f20f310861f0305c295b2e1f39932c3648eb87a4376c0833e96f495a6153090595e8e92494c47c9d82ccd486c

  • SSDEEP

    12288:jFtGHsppuuKceuIRzqyFB+SmfdCr59asIduQN7slMyw:jF4HsNeNReXSudCrWs4B

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 472-142-0x0000000001E40000-0x0000000001ECC000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections