General

  • Target

    102008-144-0x0000000000190000-0x00000000001B8000-memory.dmp

  • Size

    160KB

  • MD5

    84a7084dd8a011939d8399c6180991d6

  • SHA1

    a753d397b01f3cb0856aa52f9e25554447f8e6a0

  • SHA256

    d8416676361f2f6137a83d64c222875f9d9cfbe71b1f1cc489f8128d55cca386

  • SHA512

    628591bf16e6efb609151e41a4989e6db9ed4ab5212cc79fde571e69b9833a0172717f4d6aedc6c9e1cf17794e7c8cf410064e3d3ca265b3292dd22e10a6f628

  • SSDEEP

    3072:7YO/ZMTFF5Q9572bpaUKyBRV9DFtyRPIh0SSrz:7YMZMBF5Q9kFaUKyB5KpIh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Sup: @mr_golds)

C2

77.73.134.27:8163

Attributes
  • auth_value

    56c6f7b9024c076f0a96931453da7e56

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 102008-144-0x0000000000190000-0x00000000001B8000-memory.dmp
    .exe windows x86


    Headers

    Sections