General

  • Target

    1944-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    cfcf357df36495f2cb6759e0421ce157

  • SHA1

    120cd21a00145002bd61d1b34270d964e188afed

  • SHA256

    1083dd0d4164b99fb5204ce690cc782b27ba953a9ffea7f07d9cdf0f72fea70e

  • SHA512

    d09790d4319fa798a18f97453618ad2169ec0820e665e1d20b388e5c7a83e5a16a78680f3029fd71190bf25c84037893fb192b5727d24a63f9a8c62f512cfe28

  • SSDEEP

    3072:nYO/ZMTFvaVZFT9/ulJW4OVkDFhYRPhhhSSgJ:nYMZMBvaVZv2lJWE8phh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.21:7161

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1944-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections