General

  • Target

    2084-3-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    6e168e2fcd78afa3ea8e5d9f02cec93c

  • SHA1

    8fca3dd9eb70184b36b597c26f77188c16eac034

  • SHA256

    fb431e66c39bb724894864bd01317c24e29187adeeab572fa4509b988b2322eb

  • SHA512

    1917fc102a09c4995e14b3d023e4e8a7d96e88d8ce5b8c0731ad763987564cd64e645d3ed8f8be13502fbe11c7fa909c17888e86fe4abae045293ccf891d58a7

  • SSDEEP

    3072:nnIby/2ILnTNgcQoQixoRRSBCh2it/qfVPVng64zOjtC:nky2sTNgcQcekO/APVnv4z8

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.255.152.132:36011

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2084-3-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections