General

  • Target

    2036-9-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    c160d23f340bf793af91dad8d66da3ba

  • SHA1

    4629fb06d78b159a7b68270d5d8fa9cf7094e0eb

  • SHA256

    1b74dc2c56dbe329e8ef4f766c9453ac3027addc95fbbffb344fd5610dde05d9

  • SHA512

    581b60b4277168ef73bc5d4b512eda55a671fce8757c5d274cfc7823e6549194124795d140e6d89020d96eb3a5492c47c00e7b4bebe4f92759f2efcc1b77b14a

  • SSDEEP

    3072:OnIby/2ILnTNgcQoQixoRRSBCh2it/qfVPVng64zOjtC:Oky2sTNgcQcekO/APVnv4z8

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

51.255.152.132:36011

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2036-9-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections