General

  • Target

    5336-371-0x0000000000340000-0x0000000000368000-memory.dmp

  • Size

    160KB

  • MD5

    d6829f3ce4070aed7a428c0e816ed12e

  • SHA1

    92139c986beeb2ccdf1faa550b82356e9645fe35

  • SHA256

    529be7751c9b80e6323c2466c731aa629661c811633ad2e840672d3e7ad4cbcf

  • SHA512

    e7e4e41f10be9be81bf1f113b17382639b5436f2d46124a4b8d3bbcde54955d36b1483a03d2286daac086e06810a51e2240faffdf9c4cf1b2ee9ea9a21980053

  • SSDEEP

    3072:8YO/ZMTFL+pB1bRXHHZyXMhVvDFUyRUGhDSSw2:8YMZMBL+pBLXH0XMjJ+Gh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.21:7161

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 5336-371-0x0000000000340000-0x0000000000368000-memory.dmp
    .exe windows x86


    Headers

    Sections