General

  • Target

    1688-56-0x0000000000080000-0x00000000000A8000-memory.dmp

  • Size

    160KB

  • MD5

    d067636815b64056f082e70d91e06b5e

  • SHA1

    2fbad9acea6a7f78299230adfa847aa569761c0f

  • SHA256

    60b43b0784f811f6e31a1d1594814c533fdeab7c32de5f5afeb2af0766724e72

  • SHA512

    b58c7f8b221de7a9fc086fb9bf86dde13935a08e6c0c0dc87f41025054f989e1982b27b79de9618b8fe097364bdc1b6e93d75ed5dbef44064ebfdfa8a79e7ca3

  • SSDEEP

    3072:CYO/ZMTF5wMG9pT/U1OaWINOV0DFNyRPfhLSSEo:CYMZMB5wMG9JKOaWiNipfh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

51.89.201.21:7161

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1688-56-0x0000000000080000-0x00000000000A8000-memory.dmp
    .exe windows x86


    Headers

    Sections