General

  • Target

    1324-56-0x0000000000080000-0x00000000000A8000-memory.dmp

  • Size

    160KB

  • MD5

    31eb5f3a2904c5d9c6e45227494bd57d

  • SHA1

    fe3839616bb7a898bee17bf2a3bb5b29ae21531f

  • SHA256

    ce5dfcc3b221019f60d5ebf367cf30ab8a697b3cd5ddb85986a49221e078688b

  • SHA512

    3511e9040f107526187dd39b3359b292c47af2d0243d227ee5fdec8600564e8826f62615c455c251bbc2db327462d1eb6edb139aee7c7ce4cb437b69b4a71255

  • SSDEEP

    3072:5YO/ZMTFL+pB1bRX+duoQxB1VrDFbyRXIhQSSQz:5YMZMBL+pBLudpQHEBIh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.21:7161

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1324-56-0x0000000000080000-0x00000000000A8000-memory.dmp
    .exe windows x86


    Headers

    Sections