General

  • Target

    1368-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    36f2e7c3b922e4ae93eab0d477d8c852

  • SHA1

    3ed6c3724b7e1b6337e481992b2523dd2d40ca07

  • SHA256

    75381501d20e3b94b91b2f5a1576f8a24eaf5e9d72dadf75a01623e414df7df1

  • SHA512

    e876d48f2967a8f555e289b71eab5f54a9303c9446ab8955fa105994c3d88674fad19a15f82cd73e88f443dc812310a7e57a4429f66035b71c66093342760be5

  • SSDEEP

    3072:nYO/ZMTFx4bd5TH/KtVqPMV3DFbyZXWhrSSMB:nYMZMBx4bdRytVqP8wZWh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.21:7161

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1368-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections