General

  • Target

    100764-296-0x0000000000780000-0x00000000007A8000-memory.dmp

  • Size

    160KB

  • MD5

    f5cc51387818369730b76b465bac4a51

  • SHA1

    46b6318eaf741e2caa7813c19f5c27647e0aba9b

  • SHA256

    20d86c6a8e24ad9df494494c0bba8b217c2a1d788173996721589c7751ee3e5c

  • SHA512

    f9626345d0ad78e3eb812f923599187e7982cf10b208b1e7f0a9caebfa0be892c057f4b4b6d5a2e2a7c71d18417ea3c5059ef1d49d70e5c4056896702202bdbb

  • SSDEEP

    3072:VYO/ZMTFXHGJtjQ0lYpxN6VBDFvydPShhSSQ6W:VYMZMBXHGJmWYpxNkQ9ShH

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @me_golds)

C2

77.73.134.27:7161

Attributes
  • auth_value

    e136da06c7c0400f4091dab1787720ea

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 100764-296-0x0000000000780000-0x00000000007A8000-memory.dmp
    .exe windows x86


    Headers

    Sections