General

  • Target

    102144-168-0x0000000000790000-0x00000000007B8000-memory.dmp

  • Size

    160KB

  • MD5

    24acc16752610be92ee5239e03574d89

  • SHA1

    cd581a604fc4bc5a5e8a23100e7c2406736575d0

  • SHA256

    16cc0d29703b41f018e764585b7297c7b68372d7cb819dd7e5c60d52b1777fb4

  • SHA512

    9be76fcceb1197cfbdba40ab06b12812e3e1e943796f66d7d5cfb1285fa7843178913b34f2f9198734665e2d6e65535efd838b4943827ea05eff876606e3d1ed

  • SSDEEP

    3072:JYO/ZMTFB1klBzC/GHwQBpGVCDFjyRXRh7SSXL:JYMZMBB1klYOQQPsBRh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Sup: @mr_golds)

C2

77.73.134.27:8163

Attributes
  • auth_value

    56c6f7b9024c076f0a96931453da7e56

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 102144-168-0x0000000000790000-0x00000000007B8000-memory.dmp
    .exe windows x86


    Headers

    Sections