General

  • Target

    2852-94-0x0000000000260000-0x00000000002EC000-memory.dmp

  • Size

    560KB

  • MD5

    46310e11f0c6262a6451e877f3811230

  • SHA1

    3c6583756574c1c5740599bb7dd04fd4afceed86

  • SHA256

    fd88c08f01159a315f1202600b10acf27d2bf21101097d615e5ab1cbcf30fa52

  • SHA512

    a3200d01dff1b80623d16442f2a16b266ac4db5045990d327c3ac6fbcc2e1dfeac7220ba30bbc88d7d8245d1bd90a07c136ee073f4f32e89b99b0ae8a8222f82

  • SSDEEP

    12288:T7pay2eSW5JrZD7z7s0Wyx/n5Qx3iu/Y1Eqr0co64lT7ldYeUQqLn+K:T9avgJdDffV1jr0co64lT7j7K

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

lamp

C2

77.91.68.56:19071

Attributes
  • auth_value

    ee1df63bcdbe3de70f52810d94eaff7d

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2852-94-0x0000000000260000-0x00000000002EC000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections