General

  • Target

    101220-1040-0x0000000000770000-0x0000000000798000-memory.dmp

  • Size

    160KB

  • MD5

    a013d837063e92c54af6a0996658d7b8

  • SHA1

    d9d9cad150dde2b276f8b63d28159d71f20e7618

  • SHA256

    59d4744817f1eebaaaf4b40829213d2598ccbdf6daeda2efde991ea2cc292573

  • SHA512

    e70979b778f60b859e776908f7a1dc69eac031ab88096fe44c7ae8ecfc6b36f16fb796f528d1292b45d21bfbb231ac5ce9e12cf9dfc187a8773af870a31e8066

  • SSDEEP

    3072:lYO/ZMTFJtXkRzqOnPwQJp2VoDF3yRXHhdSSJS:lYMZMBJtXkgKoQhIBHh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @mr_golds)

C2

77.73.134.27:8163

Attributes
  • auth_value

    4b2de03af6b6ac513ac597c2e6c1ad51

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 101220-1040-0x0000000000770000-0x0000000000798000-memory.dmp
    .exe windows x86


    Headers

    Sections