General

  • Target

    1928-56-0x0000000000400000-0x0000000000428000-memory.dmp

  • Size

    160KB

  • MD5

    e9f816b7f1b9ab8e1de623f370160f98

  • SHA1

    d4263ff4316248994aec3c8fd8d73da4cc162cf5

  • SHA256

    9e605a6e3e90500997cb1ab622f2bfd17b3d58bcf2eb40a80c0948bc4bbaeead

  • SHA512

    b984c54dc92981082d5cf19912a21f8045b9ce90fbf137cf732cd52c7d6802a6f959c3beab5e18877235ab694d88d9a8a4c3022cef0f8d0063c84fff30beb794

  • SSDEEP

    3072:DYO/ZMTFL++BB1bRXNIFxMevZWFtURPJh4SSE7:DYMZMBL+WBLdIDppJh

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

145.239.202.9:4120

Attributes
  • auth_value

    3a050df92d0cf082b2cdaf87863616be

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1928-56-0x0000000000400000-0x0000000000428000-memory.dmp
    .exe windows x86


    Headers

    Sections