General

  • Target

    1628-61-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    d20de3a9c79fd4265b883dc5959fac51

  • SHA1

    399dd886c8057859040cdc9dcc519f374f563ce4

  • SHA256

    2b8732358d383d528bd73a58f88286e484de9bf7bfe95250a2803892130b1bc7

  • SHA512

    25ef6fdd3fe96b07771fa63e8852922a7f91a5b172ee6c10970fb76c27b41dc8e5fb96fa47be7ac5478de76d627af55cb4461e7f2455ee70131b5d2563c52bd9

  • SSDEEP

    3072:KYO/ZMTFNRbc5reHhv+oUSlVpDFHy1X5hJSS:KYMZMBNRbcsBv+oUSxAd5h

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Sup: @mr_golds)

C2

51.89.201.21:7161

Attributes
  • auth_value

    56c6f7b9024c076f0a96931453da7e56

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1628-61-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections