General

  • Target

    2092-315-0x0000000000400000-0x0000000000420000-memory.dmp

  • Size

    128KB

  • MD5

    898887c7a2a3f3b136740c281602d576

  • SHA1

    d9fdf79116699272a4ba5df2eba5744f19dff6b7

  • SHA256

    8a8aa54da3b994eef81f64d7c53d9e5e25b548ee122bfc64795b95171d04959c

  • SHA512

    09156aecf7261484a677583ed80052e92020ec19bcea795467117318d47d5c0a58f0736b908e618668b5bffba60dd78c0dce7084dd9a440a5ed14d2eed2801fb

  • SSDEEP

    3072:LcvFBFCYOpikIcgtKcdOMNx7QcL3+UDch44EASNN:LcvbZbdjrUcBch44jS

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Sup: @mr_golds)

C2

193.233.193.14:8163

Attributes
  • auth_value

    56c6f7b9024c076f0a96931453da7e56

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 2092-315-0x0000000000400000-0x0000000000420000-memory.dmp
    .exe windows x86


    Headers

    Sections