General

  • Target

    1476-57-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    9ba29396e53d36dde15a1bd575878972

  • SHA1

    1eadb209f33e58a1b6b58e6b9639f80a8458bc5c

  • SHA256

    1100212d4d68b2cdcc316074fb1e775b215c436d2758019fd9e603174b12fae1

  • SHA512

    80f01b2ce0516ac39834dd7f31b0e41cf4dd2c8ec7bd69206f65b0e2f250bfecffee5a785cca26fb3793422faa167313b34833c5a8fc7a94fdcdaa091a49e24d

  • SSDEEP

    3072:TYO/ZMTFL+pB1bRX0ixYWHFVUDFEZRPzhfSSUM:TYMZMBL+pBLEiaWcUpzh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.21:7161

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1476-57-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections