General

  • Target

    75480-1005-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    44a8319ccb1ff3612327417d9d05826c

  • SHA1

    bc2851517b0a68daca2d95bf5a3ea47326a31d4e

  • SHA256

    e20db3e34760f9d3e455f3978fc86fd40d82071afdc14a1a8eff7c40d4ed23cc

  • SHA512

    0413afa893cb38d812c80cfa3be0d76a1a8ca4ea604fb8450524204fc89915d4b4587881a6e62538e5428a984cf9a90546f8d4f400d4c7c03133b2bf045df120

  • SSDEEP

    3072:CYO/ZMTFB1klBzC/GHwQBpGVCDFjyRXRh7SSsL:CYMZMBB1klYOQQPsBRh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Sup: @mr_golds)

C2

77.73.134.27:8163

Attributes
  • auth_value

    56c6f7b9024c076f0a96931453da7e56

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 75480-1005-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections