General

  • Target

    2360-102-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    604b22620339fef9f45e1e6f62e831e8

  • SHA1

    eb88c77d69ec23372104882efb87cceb9aabce17

  • SHA256

    1b4875790e3d5633e90a479d26980c62f0c097723203db616b925a08548f39a3

  • SHA512

    e73dfbd9e2508c6dc70943dc858bb013c68e92a5f732a50337fb42505b3b9ebe8c8038fc19cee7d51639d9021c0491c91b624238fe01d684638a79c68637893f

  • SSDEEP

    6144:BlsWUnzNgckqYn22mr/Wn449ZQyrevpM:HshzNgckq5oTTrevpM

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

171.22.28.236:38306

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2360-102-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections